Vulnerabilities > Improper Validation of Integrity Check Value
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-20 | CVE-2020-1879 | Improper Validation of Integrity Check Value vulnerability in Huawei products There is an improper integrity checking vulnerability on some huawei products. | 3.9 |
2019-12-26 | CVE-2019-5272 | Improper Validation of Integrity Check Value vulnerability in Huawei Usg9500 Firmware V500R001C30/V500R001C60 USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. | 4.0 |
2019-12-06 | CVE-2019-18672 | Improper Validation of Integrity Check Value vulnerability in Shapeshift Keepkey Firmware Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. | 5.0 |
2019-11-14 | CVE-2012-1170 | Improper Validation of Integrity Check Value vulnerability in multiple products Moodle before 2.2.2 has an external enrolment plugin context check issue where capability checks are not thorough | 5.0 |
2019-11-04 | CVE-2019-13496 | Improper Validation of Integrity Check Value vulnerability in Oneidentity Cloud Access Manager One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response. | 4.3 |
2019-10-10 | CVE-2019-1166 | Improper Validation of Integrity Check Value vulnerability in Microsoft products A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'. | 4.3 |
2019-10-09 | CVE-2019-0071 | Improper Validation of Integrity Check Value vulnerability in Juniper Junos 18.1/18.3 Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. | 7.2 |
2019-09-27 | CVE-2019-11753 | Improper Validation of Integrity Check Value vulnerability in Mozilla Firefox The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. | 4.6 |
2019-08-14 | CVE-2019-1163 | Improper Validation of Integrity Check Value vulnerability in Microsoft products A security feature bypass exists when Windows incorrectly validates CAB file signatures. | 5.5 |
2019-06-12 | CVE-2019-10155 | Improper Validation of Integrity Check Value vulnerability in multiple products The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. | 3.1 |