Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-09 | CVE-2022-31813 | Insufficient Verification of Data Authenticity vulnerability in multiple products Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. | 9.8 |
2022-06-08 | CVE-2022-28385 | Insufficient Verification of Data Authenticity vulnerability in Verbatim products An issue was discovered in certain Verbatim drives through 2022-03-31. | 4.6 |
2022-05-31 | CVE-2022-29220 | Insufficient Verification of Data Authenticity vulnerability in Fastify Github Action Merge Dependabot github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). | 6.5 |
2022-05-12 | CVE-2021-26368 | Insufficient Verification of Data Authenticity vulnerability in AMD products Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service. | 4.4 |
2022-05-06 | CVE-2021-27759 | Insufficient Verification of Data Authenticity vulnerability in Hcltech Bigfix Inventory This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. | 6.5 |
2022-04-21 | CVE-2022-20795 | Insufficient Verification of Data Authenticity vulnerability in Cisco Adaptive Security Appliance A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. | 7.5 |
2022-04-21 | CVE-2020-14116 | Insufficient Verification of Data Authenticity vulnerability in MI Browser An intent redirection vulnerability in the Mi Browser product. | 7.5 |
2022-04-21 | CVE-2020-14122 | Insufficient Verification of Data Authenticity vulnerability in MI Miui 12.5.2 Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage. | 5.5 |
2022-04-19 | CVE-2021-26625 | Insufficient Verification of Data Authenticity vulnerability in Tobesoft Nexacro 17.1.2.500/17.1.2.600/17.1.3.301 Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform. | 8.8 |
2022-03-29 | CVE-2022-26871 | Insufficient Verification of Data Authenticity vulnerability in Trendmicro Apex Central and Apex ONE An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution. | 9.8 |