Vulnerabilities > Improper Verification of Cryptographic Signature

DATE CVE VULNERABILITY TITLE RISK
2023-01-20 CVE-2023-22742 Improper Verification of Cryptographic Signature vulnerability in Libgit2
libgit2 is a cross-platform, linkable library implementation of Git.
network
high complexity
libgit2 CWE-347
5.9
2023-01-20 CVE-2023-24025 Improper Verification of Cryptographic Signature vulnerability in Pqclean Project Pqclean
CRYSTALS-DILITHIUM (in Post-Quantum Cryptography Selected Algorithms 2022) in PQClean d03da30 may allow universal forgeries of digital signatures via a template side-channel attack because of intermediate data leakage of one vector.
network
low complexity
pqclean-project CWE-347
7.5
2023-01-11 CVE-2022-46176 Improper Verification of Cryptographic Signature vulnerability in Rust-Lang Cargo
Cargo is a Rust package manager.
network
high complexity
rust-lang CWE-347
5.9
2022-12-28 CVE-2020-36563 Improper Verification of Cryptographic Signature vulnerability in Robotsandpencils Go-Saml
XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input.
network
low complexity
robotsandpencils CWE-347
5.3
2022-12-22 CVE-2022-23540 Improper Verification of Cryptographic Signature vulnerability in Auth0 Jsonwebtoken
In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification.
network
low complexity
auth0 CWE-347
7.6
2022-12-19 CVE-2022-47549 An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
high complexity
CWE-347
6.4
2022-12-15 CVE-2022-23507 Tendermint is a high-performance blockchain consensus engine for Byzantine fault tolerant applications.
network
low complexity
CWE-347
6.5
2022-11-04 CVE-2022-41669 Improper Verification of Cryptographic Signature vulnerability in Schneider-Electric products
A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code.
local
low complexity
schneider-electric CWE-347
7.8
2022-11-04 CVE-2022-41666 Improper Verification of Cryptographic Signature vulnerability in Schneider-Electric products
A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code.
local
low complexity
schneider-electric CWE-347
7.8
2022-11-01 CVE-2022-42793 Improper Verification of Cryptographic Signature vulnerability in Apple Ipados and Iphone OS
An issue in code signature validation was addressed with improved checks.
local
low complexity
apple CWE-347
5.5