Vulnerabilities > Improper Validation of Specified Quantity in Input
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-13 | CVE-2022-20488 | Improper Validation of Specified Quantity in Input vulnerability in Google Android In NotificationChannel of NotificationChannel.java, there is a possible failure to persist permissions settings due to resource exhaustion. | 7.8 |
2022-12-13 | CVE-2022-20491 | Improper Validation of Specified Quantity in Input vulnerability in Google Android In NotificationChannel of NotificationChannel.java, there is a possible failure to persist permissions settings due to resource exhaustion. | 7.8 |
2022-12-12 | CVE-2022-20686 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device and cause the LLDP service to restart. These vulnerabilities are due to missing length validation of certain LLDP packet header fields. | 5.3 |
2022-12-12 | CVE-2022-20687 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device and cause the LLDP service to restart. These vulnerabilities are due to missing length validation of certain LLDP packet header fields. | 5.3 |
2022-12-12 | CVE-2022-20688 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device and cause Cisco Discovery Protocol service to restart. This vulnerability is due to missing length validation of certain Cisco Discovery Protocol packet header fields. | 5.3 |
2022-12-12 | CVE-2022-20689 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. | 8.8 |
2022-12-12 | CVE-2022-20690 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. | 8.8 |
2022-12-12 | CVE-2022-20691 | Improper Validation of Specified Quantity in Input vulnerability in Cisco products A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Adaptive Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause a DoS condition of an affected device. This vulnerability is due to missing length validation of certain Cisco Discovery Protocol packet header fields. | 6.5 |
2022-12-01 | CVE-2022-41968 | Improper Validation of Specified Quantity in Input vulnerability in Nextcloud Server Nextcloud Server is an open source personal cloud server. | 5.3 |
2022-11-18 | CVE-2022-41896 | Improper Validation of Specified Quantity in Input vulnerability in Google Tensorflow TensorFlow is an open source platform for machine learning. | 7.5 |