Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2022-09-14 CVE-2022-29492 Improper Input Validation vulnerability in Hitachienergy Microscada X Sys600
Improper Input Validation vulnerability in the handling of a malformed IEC 104 TCP packet in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600.
network
low complexity
hitachienergy CWE-20
7.5
2022-09-14 CVE-2022-29922 Improper Input Validation vulnerability in Hitachienergy Microscada X Sys600
Improper Input Validation vulnerability in the handling of a specially crafted IEC 61850 packet with a valid data item but with incorrect data type in the IEC 61850 OPC Server in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600.
network
low complexity
hitachienergy CWE-20
7.5
2022-09-13 CVE-2022-20392 Improper Input Validation vulnerability in Google Android
In declareDuplicatePermission of ParsedPermissionUtils.java, there is a possible way to obtain a dangerous permission without user consent due to improper input validation.
local
low complexity
google CWE-20
7.8
2022-09-09 CVE-2022-36087 Improper Input Validation vulnerability in multiple products
OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+.
network
low complexity
oauthlib-project fedoraproject CWE-20
6.5
2022-09-09 CVE-2021-40648 Improper Input Validation vulnerability in Man2Html Project Man2Html 1.6G
In man2html 1.6g, a filename can be created to overwrite the previous size parameter of the next chunk and the fd, bk, fd_nextsize, bk_nextsize of the current chunk.
local
low complexity
man2html-project CWE-20
5.5
2022-09-09 CVE-2022-3169 Improper Input Validation vulnerability in multiple products
A flaw was found in the Linux kernel.
local
low complexity
linux fedoraproject debian CWE-20
5.5
2022-09-06 CVE-2022-36058 Improper Input Validation vulnerability in Elrond GO
Elrond go is the go implementation for the Elrond Network protocol.
network
low complexity
elrond CWE-20
7.5
2022-09-06 CVE-2022-31020 Improper Input Validation vulnerability in Linuxfoundation Indy-Node
Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity.
network
low complexity
linuxfoundation CWE-20
8.8
2022-09-05 CVE-2022-30331 Improper Input Validation vulnerability in Tigergraph 3.6.0
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation.
network
low complexity
tigergraph CWE-20
8.8
2022-09-02 CVE-2021-35109 Improper Input Validation vulnerability in Qualcomm products
Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile
low complexity
qualcomm CWE-20
6.8