Vulnerabilities > Improper Input Validation

DATE CVE VULNERABILITY TITLE RISK
2000-05-13 CVE-2000-0400 Improper Input Validation vulnerability in Microsoft Internet Explorer 5
The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post.
network
low complexity
microsoft CWE-20
7.5
2000-04-26 CVE-2000-0380 Improper Input Validation vulnerability in Cisco IOS
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
network
cisco CWE-20
7.1
2000-04-12 CVE-2000-0258 Improper Input Validation vulnerability in Microsoft products
IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad Escaped Characters" Vulnerability.
network
low complexity
microsoft CWE-20
5.0
1999-12-30 CVE-1999-0001 Improper Input Validation vulnerability in multiple products
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
network
low complexity
bsdi freebsd openbsd CWE-20
5.0
1999-11-25 CVE-1999-1547 Improper Input Validation vulnerability in Oracle web Listener 2.1
Oracle Web Listener 2.1 allows remote attackers to bypass access restrictions by replacing a character in the URL with its HTTP-encoded (hex) equivalent.
network
low complexity
oracle CWE-20
7.5