Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-27 | CVE-2022-24889 | Insufficient Verification of Data Authenticity vulnerability in Nextcloud Server Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. | 4.3 |
2022-04-21 | CVE-2022-20795 | Insufficient Verification of Data Authenticity vulnerability in Cisco Adaptive Security Appliance A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. | 7.5 |
2022-04-21 | CVE-2020-14116 | Insufficient Verification of Data Authenticity vulnerability in MI Browser An intent redirection vulnerability in the Mi Browser product. | 7.5 |
2022-04-21 | CVE-2020-14122 | Insufficient Verification of Data Authenticity vulnerability in MI Miui 12.5.2 Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage. | 5.5 |
2022-04-20 | CVE-2022-26516 | Insufficient Verification of Data Authenticity vulnerability in Redlion Da50N Firmware Authorized users may install a maliciously modified package file when updating the device via the web user interface. | 7.8 |
2022-04-19 | CVE-2021-26625 | Insufficient Verification of Data Authenticity vulnerability in Tobesoft Nexacro 17.1.2.500/17.1.2.600/17.1.3.301 Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform. | 8.8 |
2022-03-29 | CVE-2022-26871 | Insufficient Verification of Data Authenticity vulnerability in Trendmicro Apex Central and Apex ONE An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution. | 9.8 |
2022-03-18 | CVE-2021-4031 | Insufficient Verification of Data Authenticity vulnerability in Syltek Syltek application before its 10.22.00 version, does not correctly check that a product ID has a valid payment associated to it. | 7.5 |
2022-03-16 | CVE-2021-39689 | Insufficient Verification of Data Authenticity vulnerability in Google Android 12.0 In multiple functions of odsign_main.cpp, there is a possible way to persist system attack due to a logic error in the code. | 6.7 |
2022-03-10 | CVE-2020-14111 | Insufficient Verification of Data Authenticity vulnerability in MI Ax3600 Firmware 1.0.50/1.0.67/1.1.12 A command injection vulnerability exists in the Xiaomi Router AX3600. | 7.8 |