Vulnerabilities > Improper Validation of Integrity Check Value

DATE CVE VULNERABILITY TITLE RISK
2020-03-20 CVE-2020-1879 Improper Validation of Integrity Check Value vulnerability in Huawei products
There is an improper integrity checking vulnerability on some huawei products.
low complexity
huawei CWE-354
3.9
2019-12-26 CVE-2019-5272 Improper Validation of Integrity Check Value vulnerability in Huawei Usg9500 Firmware V500R001C30/V500R001C60
USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability.
network
low complexity
huawei CWE-354
4.0
2019-12-06 CVE-2019-18672 Improper Validation of Integrity Check Value vulnerability in Shapeshift Keepkey Firmware
Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages.
network
low complexity
shapeshift CWE-354
5.0
2019-11-14 CVE-2012-1170 Improper Validation of Integrity Check Value vulnerability in multiple products
Moodle before 2.2.2 has an external enrolment plugin context check issue where capability checks are not thorough
network
low complexity
moodle fedoraproject CWE-354
5.0
2019-11-04 CVE-2019-13496 Improper Validation of Integrity Check Value vulnerability in Oneidentity Cloud Access Manager
One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
4.3
2019-10-10 CVE-2019-1166 Improper Validation of Integrity Check Value vulnerability in Microsoft products
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
network
microsoft CWE-354
4.3
2019-10-09 CVE-2019-0071 Improper Validation of Integrity Check Value vulnerability in Juniper Junos 18.1/18.3
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed.
local
low complexity
juniper CWE-354
7.2
2019-09-27 CVE-2019-11753 Improper Validation of Integrity Check Value vulnerability in Mozilla Firefox
The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware.
local
low complexity
mozilla CWE-354
4.6
2019-08-14 CVE-2019-1163 Improper Validation of Integrity Check Value vulnerability in Microsoft products
A security feature bypass exists when Windows incorrectly validates CAB file signatures.
local
low complexity
microsoft CWE-354
5.5
2019-06-12 CVE-2019-10155 Improper Validation of Integrity Check Value vulnerability in multiple products
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified.
3.1