Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2022-08-18 CVE-2022-21212 Improper Input Validation vulnerability in Intel products
Improper input validation for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
low complexity
intel CWE-20
6.5
2022-08-18 CVE-2022-23403 Improper Input Validation vulnerability in Intel Data Center Manager
Improper input validation in the Intel(R) Data Center Manager software before version 4.1 may allow an authenticated user to potentially enable denial of service via local access.
local
low complexity
intel CWE-20
5.5
2022-08-18 CVE-2022-36023 Improper Input Validation vulnerability in Hyperledger Fabric
Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications.
network
low complexity
hyperledger CWE-20
5.3
2022-08-16 CVE-2020-1756 Improper Input Validation vulnerability in Moodle
In Moodle before 3.8.2, 3.7.5, 3.6.9 and 3.5.11, insufficient input escaping was applied to the PHP unit webrunner admin tool.
network
low complexity
moodle CWE-20
7.2
2022-08-16 CVE-2022-35239 Improper Input Validation vulnerability in Contec Sv-Cpt-Mc310 Firmware and Sv-Cpt-Mc310F Firmware
The image file management page of SolarView Compact SV-CPT-MC310 Ver.7.23 and earlier, and SV-CPT-MC310F Ver.7.23 and earlier contains an insufficient verification vulnerability when uploading files.
network
low complexity
contec CWE-20
8.8
2022-08-16 CVE-2022-24952 Improper Input Validation vulnerability in Eternal Terminal Project Eternal Terminal
Several denial of service vulnerabilities exist in Eternal Terminal prior to version 6.2.0, including a DoS triggered remotely by an invalid sequence number and a local bug triggered by invalid input sent directly to the IPC socket.
network
low complexity
eternal-terminal-project CWE-20
6.5
2022-08-12 CVE-2022-2618 Improper Input Validation vulnerability in multiple products
Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .
network
low complexity
google fedoraproject CWE-20
6.5
2022-08-12 CVE-2022-20266 Improper Input Validation vulnerability in Google Android 13.0
In Companion, there is a possible way to keep a service running with elevated importance without showing foreground service notification due to improper input validation.
local
low complexity
google CWE-20
5.0
2022-08-12 CVE-2022-20314 Improper Input Validation vulnerability in Google Android 13.0
In KeyChain, there is a possible spoof keychain chooser activity request due to improper input validation.
local
low complexity
google CWE-20
6.7
2022-08-12 CVE-2022-20338 Improper Input Validation vulnerability in Google Android 13.0
In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation.
local
low complexity
google CWE-20
3.3