Vulnerabilities > Improper Verification of Cryptographic Signature

DATE CVE VULNERABILITY TITLE RISK
2025-05-23 CVE-2022-31807 A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions), SiPass integrated ACC-AP (All versions).
local
low complexity
CWE-347
6.2
2025-05-13 CVE-2025-3757 Improper Verification of Cryptographic Signature vulnerability in Openpubkey
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification.
network
low complexity
openpubkey CWE-347
critical
9.8
2025-05-13 CVE-2025-4658 Improper Verification of Cryptographic Signature vulnerability in Openpubkey and Opkssh
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification.
network
low complexity
openpubkey CWE-347
critical
9.8
2025-04-30 CVE-2025-33074 Improper Verification of Cryptographic Signature vulnerability in Microsoft Azure Functions
Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
network
low complexity
microsoft CWE-347
8.8
2025-04-27 CVE-2025-2866 Improper Verification of Cryptographic Signature vulnerability in Libreoffice
Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.
network
low complexity
libreoffice CWE-347
critical
9.8
2025-04-16 CVE-2025-20178 A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files.
local
low complexity
CWE-347
6.0
2025-04-10 CVE-2025-29915 Improper Verification of Cryptographic Signature vulnerability in Oisf Suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.
network
low complexity
oisf CWE-347
7.5
2025-03-12 CVE-2025-20143 A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device.
local
low complexity
CWE-347
6.7
2025-03-11 CVE-2025-24043 Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.
network
high complexity
CWE-347
7.5
2025-03-05 CVE-2025-20206 A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time.
local
low complexity
CWE-347
7.1