Vulnerabilities > Insufficient Verification of Data Authenticity

DATE CVE VULNERABILITY TITLE RISK
2022-06-08 CVE-2022-28385 Insufficient Verification of Data Authenticity vulnerability in Verbatim products
An issue was discovered in certain Verbatim drives through 2022-03-31.
local
low complexity
verbatim CWE-345
2.1
2022-05-31 CVE-2022-29220 Insufficient Verification of Data Authenticity vulnerability in Fastify Github Action Merge Dependabot
github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs).
network
low complexity
fastify CWE-345
4.0
2022-05-12 CVE-2021-26368 Insufficient Verification of Data Authenticity vulnerability in AMD products
Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.
local
low complexity
amd CWE-345
4.9
2022-05-06 CVE-2021-27759 Insufficient Verification of Data Authenticity vulnerability in Hcltech Bigfix Inventory
This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally.
network
hcltech CWE-345
4.3
2022-04-27 CVE-2022-24889 Insufficient Verification of Data Authenticity vulnerability in Nextcloud Server
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform.
network
low complexity
nextcloud CWE-345
4.3
2022-04-21 CVE-2022-20795 Insufficient Verification of Data Authenticity vulnerability in Cisco Adaptive Security Appliance
A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-345
7.5
2022-04-21 CVE-2020-14116 Insufficient Verification of Data Authenticity vulnerability in MI Browser
An intent redirection vulnerability in the Mi Browser product.
network
low complexity
mi CWE-345
5.0
2022-04-21 CVE-2020-14122 Insufficient Verification of Data Authenticity vulnerability in MI Miui 12.5.2
Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage.
local
low complexity
mi CWE-345
2.1
2022-04-20 CVE-2022-26516 Insufficient Verification of Data Authenticity vulnerability in Redlion Da50N Firmware
Authorized users may install a maliciously modified package file when updating the device via the web user interface.
network
redlion CWE-345
6.8
2022-04-19 CVE-2021-26625 Insufficient Verification of Data Authenticity vulnerability in Tobesoft Nexacro 17.1.2.500/17.1.2.600/17.1.3.301
Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform.
network
tobesoft CWE-345
6.8