Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2007-10-09 CVE-2007-5281 Improper Input Validation vulnerability in Hitachi products
The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer's Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests.
network
low complexity
hitachi CWE-20
5.0
2007-10-08 CVE-2007-5275 Improper Input Validation vulnerability in Adobe Shockwave Player 9
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
network
low complexity
adobe CWE-20
5.0
2007-10-08 CVE-2007-5269 Improper Input Validation vulnerability in Libpng
Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
network
low complexity
libpng CWE-20
5.0
2007-10-08 CVE-2007-4924 Improper Input Validation vulnerability in multiple products
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
network
low complexity
ekiga openh323-project CWE-20
5.0
2007-10-06 CVE-2007-5253 Improper Input Validation vulnerability in Mcmurtrey Whitaker and Associates Cart32
c32web.exe in McMurtrey/Whitaker Cart32 before 6.4 allows remote attackers to read arbitrary files via the ImageName parameter in a GetImage action, by appending a NULL byte (%00) sequence followed by an image file extension, as demonstrated by a request for a ".txt%00.gif" file.
network
low complexity
mcmurtrey-whitaker-and-associates CWE-20
5.0
2007-10-05 CVE-2007-5231 Improper Input Validation vulnerability in Zomplog
Unrestricted file upload vulnerability in admin/upload_files.php in Zomplog 3.8.1 and earlier allows remote authenticated administrators to upload and execute arbitrary .php files by sending a modified MIME type.
network
high complexity
zomplog CWE-20
4.6
2007-10-05 CVE-2007-5226 Improper Input Validation vulnerability in Dircproxy
irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via an ACTION command without a parameter, which triggers a NULL pointer dereference, as demonstrated using a blank /me message from irssi.
network
low complexity
dircproxy CWE-20
5.0
2007-10-01 CVE-2007-5168 Improper Input Validation vulnerability in Clanlite 1.23.01.2005
Multiple PHP remote file inclusion vulnerabilities in ClanLite 1.23.01.2005 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) modules/serveur_jeux.php or (2) conf/conf-php.php.
network
clanlite CWE-20
6.8
2007-10-01 CVE-2007-5155 Improper Input Validation vulnerability in Iceows 4.20B
IceGUI.DLL in ICEOWS 4.20b invokes a function with incorrect arguments, which allows user-assisted remote attackers to execute arbitrary code via a long filename in the header of an ACE archive, which triggers a stack-based buffer overflow.
network
iceows CWE-20
critical
9.3
2007-09-27 CVE-2007-4671 Improper Input Validation vulnerability in Apple Safari
Unspecified vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to "alter or access" HTTPS content via an HTTP session with a crafted web page that causes Javascript to be applied to HTTPS pages from the same domain.
network
apple CWE-20
6.8