Vulnerabilities > Improper Verification of Cryptographic Signature

DATE CVE VULNERABILITY TITLE RISK
2024-09-28 CVE-2024-23960 Improper Verification of Cryptographic Signature vulnerability in Alpsalpine Ilx-F509 Firmware 6.0.000
Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability.
low complexity
alpsalpine CWE-347
4.6
2024-09-17 CVE-2024-7788 Improper Verification of Cryptographic Signature vulnerability in Libreoffice
Improper Digital Signature Invalidation  vulnerability in Zip Repair Mode of The Document Foundation LibreOffice allows Signature forgery vulnerability in LibreOfficeThis issue affects LibreOffice: from 24.2 before < 24.2.5.
local
low complexity
libreoffice CWE-347
7.8
2024-08-20 CVE-2024-6800 Improper Verification of Cryptographic Signature vulnerability in Github Enterprise Server
An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML.
network
low complexity
github CWE-347
critical
9.8
2024-08-06 CVE-2023-28806 Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering.
network
low complexity
zscaler CWE-347
6.5
2024-08-06 CVE-2024-23456 Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector
Anti-tampering can be disabled under certain conditions without signature validation.
network
low complexity
zscaler CWE-347
7.5
2024-08-06 CVE-2024-23460 Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed.
local
low complexity
zscaler CWE-347
7.8
2024-08-02 CVE-2024-42461 Improper Verification of Cryptographic Signature vulnerability in Elliptic Project Elliptic 6.5.6
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
network
low complexity
elliptic-project CWE-347
critical
9.1
2024-07-31 CVE-2024-41254 Improper Verification of Cryptographic Signature vulnerability in Litestream
An issue was discovered in litestream v0.3.13.
network
high complexity
litestream CWE-347
5.3
2024-07-31 CVE-2024-41258 Improper Verification of Cryptographic Signature vulnerability in Filestash
An issue was discovered in filestash v0.4.
network
high complexity
filestash CWE-347
5.3
2024-07-02 CVE-2024-20892 Improper Verification of Cryptographic Signature vulnerability in Samsung Android 12.0/13.0/14.0
Improper verification of signature in FilterProvider prior to SMR Jul-2024 Release 1 allows local attackers to execute privileged behaviors.
local
low complexity
samsung CWE-347
7.8