Vulnerabilities > Improper Verification of Cryptographic Signature
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-20 | CVE-2023-22742 | Improper Verification of Cryptographic Signature vulnerability in Libgit2 libgit2 is a cross-platform, linkable library implementation of Git. | 5.9 |
2023-01-20 | CVE-2023-24025 | Improper Verification of Cryptographic Signature vulnerability in Pqclean Project Pqclean CRYSTALS-DILITHIUM (in Post-Quantum Cryptography Selected Algorithms 2022) in PQClean d03da30 may allow universal forgeries of digital signatures via a template side-channel attack because of intermediate data leakage of one vector. | 7.5 |
2023-01-11 | CVE-2022-46176 | Improper Verification of Cryptographic Signature vulnerability in Rust-Lang Cargo Cargo is a Rust package manager. | 5.9 |
2022-12-28 | CVE-2020-36563 | Improper Verification of Cryptographic Signature vulnerability in Robotsandpencils Go-Saml XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input. | 5.3 |
2022-12-22 | CVE-2022-23540 | Improper Verification of Cryptographic Signature vulnerability in Auth0 Jsonwebtoken In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. | 7.6 |
2022-12-19 | CVE-2022-47549 | An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections. high complexity CWE-347 | 6.4 |
2022-12-15 | CVE-2022-23507 | Tendermint is a high-performance blockchain consensus engine for Byzantine fault tolerant applications. | 6.5 |
2022-11-04 | CVE-2022-41669 | Improper Verification of Cryptographic Signature vulnerability in Schneider-Electric products A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code. | 7.8 |
2022-11-04 | CVE-2022-41666 | Improper Verification of Cryptographic Signature vulnerability in Schneider-Electric products A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. | 7.8 |
2022-11-01 | CVE-2022-42793 | Improper Verification of Cryptographic Signature vulnerability in Apple Ipados and Iphone OS An issue in code signature validation was addressed with improved checks. | 5.5 |