Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2022-01-26 CVE-2021-29845 Improper Input Validation vulnerability in IBM Security Guardium Insights 3.0.0
IBM Security Guardium Insights 3.0 could allow an authenticated user to perform unauthorized actions due to improper input validation.
network
low complexity
ibm CWE-20
8.8
2022-01-25 CVE-2022-23014 Improper Input Validation vulnerability in F5 Big-Ip Access Policy Manager
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP APM portal access is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.
network
low complexity
f5 CWE-20
6.5
2022-01-25 CVE-2022-23019 Improper Input Validation vulnerability in F5 products
On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization.
network
low complexity
f5 CWE-20
7.5
2022-01-24 CVE-2021-36342 Improper Input Validation vulnerability in Dell products
Dell BIOS contains an improper input validation vulnerability.
local
low complexity
dell CWE-20
6.7
2022-01-24 CVE-2021-36343 Improper Input Validation vulnerability in Dell products
Dell BIOS contains an improper input validation vulnerability.
local
low complexity
dell CWE-20
6.7
2022-01-24 CVE-2021-43588 Improper Input Validation vulnerability in Dell EMC Data Protection Central
Dell EMC Data Protection Central version 19.5 contains an Improper Input Validation Vulnerability.
network
low complexity
dell CWE-20
7.5
2022-01-24 CVE-2021-45223 Improper Input Validation vulnerability in Coins-Global Coins Construction Cloud 11.12
An issue was discovered in COINS Construction Cloud 11.12.
network
low complexity
coins-global CWE-20
6.5
2022-01-20 CVE-2022-22820 Improper Input Validation vulnerability in Linecorp Line
Due to the lack of media file checks before rendering, it was possible for an attacker to cause abnormal CPU consumption for message recipient by sending specially crafted gif image in LINE for Windows before 7.4.
local
low complexity
linecorp CWE-20
5.5
2022-01-19 CVE-2022-22176 Improper Input Validation vulnerability in Juniper Junos
An Improper Validation of Syntactic Correctness of Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker sending a malformed DHCP packet to cause a crash of jdhcpd and thereby a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5
2022-01-19 CVE-2022-22179 Improper Input Validation vulnerability in Juniper Junos
A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5