Vulnerabilities > Improper Input Validation
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-07-30 | CVE-2021-37595 | Improper Input Validation vulnerability in Freerdp In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU. | 9.8 |
2021-07-29 | CVE-2021-36742 | Improper Input Validation vulnerability in Trendmicro products A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. | 7.8 |
2021-07-26 | CVE-2021-32795 | Improper Input Validation vulnerability in Archisteamfarm Project Archisteamfarm ArchiSteamFarm is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. | 5.9 |
2021-07-26 | CVE-2021-29770 | Improper Input Validation vulnerability in IBM I2 Analyze 4.3.0/4.3.1/4.3.2 IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow an authenticated user to perform unauthorized actions due to hazardous input validation. | 6.5 |
2021-07-21 | CVE-2021-1097 | Improper Input Validation vulnerability in Nvidia Virtual GPU NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. | 7.8 |
2021-07-20 | CVE-2020-7866 | Improper Input Validation vulnerability in Tobesoft Xplatform When using XPLATFORM 9.2.2.270 or earlier versions ActiveX component, arbitrary commands can be executed due to improper input validation | 9.8 |
2021-07-19 | CVE-2020-5321 | Improper Input Validation vulnerability in Dell products Dell EMC OpenManage Enterprise (OME) versions prior to 3.2 and OpenManage Enterprise-Modular (OME-M) versions prior to 1.10.00 contain an improper input validation vulnerability. | 7.6 |
2021-07-19 | CVE-2021-29780 | Improper Input Validation vulnerability in IBM Resilient Security Orchestration Automation and Response 38.0/38.2 IBM Resilient OnPrem v41.1 of IBM Security SOAR could allow an authenticated user to perform actions that they should not have access to due to improper input validation. | 4.7 |
2021-07-15 | CVE-2021-0278 | Improper Input Validation vulnerability in Juniper Junos An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device. | 7.8 |
2021-07-15 | CVE-2021-20496 | Improper Input Validation vulnerability in IBM Security Verify Access 10.0.0 IBM Security Verify Access Docker 10.0.0 could allow an authenticated user to bypass input due to improper input validation. | 4.9 |