Vulnerabilities > Insufficient Verification of Data Authenticity

DATE CVE VULNERABILITY TITLE RISK
2022-06-09 CVE-2022-31813 Insufficient Verification of Data Authenticity vulnerability in multiple products
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.
network
low complexity
apache netapp fedoraproject CWE-345
critical
9.8
2022-06-08 CVE-2022-28385 Insufficient Verification of Data Authenticity vulnerability in Verbatim products
An issue was discovered in certain Verbatim drives through 2022-03-31.
low complexity
verbatim CWE-345
4.6
2022-05-31 CVE-2022-29220 Insufficient Verification of Data Authenticity vulnerability in Fastify Github Action Merge Dependabot
github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs).
network
low complexity
fastify CWE-345
6.5
2022-05-12 CVE-2021-26368 Insufficient Verification of Data Authenticity vulnerability in AMD products
Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.
local
low complexity
amd CWE-345
4.4
2022-05-06 CVE-2021-27759 Insufficient Verification of Data Authenticity vulnerability in Hcltech Bigfix Inventory
This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally.
network
low complexity
hcltech CWE-345
6.5
2022-04-21 CVE-2022-20795 Insufficient Verification of Data Authenticity vulnerability in Cisco Adaptive Security Appliance
A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-345
7.5
2022-04-21 CVE-2020-14116 Insufficient Verification of Data Authenticity vulnerability in MI Browser
An intent redirection vulnerability in the Mi Browser product.
network
low complexity
mi CWE-345
7.5
2022-04-21 CVE-2020-14122 Insufficient Verification of Data Authenticity vulnerability in MI Miui 12.5.2
Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage.
local
low complexity
mi CWE-345
5.5
2022-04-19 CVE-2021-26625 Insufficient Verification of Data Authenticity vulnerability in Tobesoft Nexacro 17.1.2.500/17.1.2.600/17.1.3.301
Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform.
network
low complexity
tobesoft CWE-345
8.8
2022-03-29 CVE-2022-26871 Insufficient Verification of Data Authenticity vulnerability in Trendmicro Apex Central and Apex ONE
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
network
low complexity
trendmicro CWE-345
critical
9.8