Vulnerabilities > Insufficient Verification of Data Authenticity

DATE CVE VULNERABILITY TITLE RISK
2022-04-27 CVE-2022-24889 Insufficient Verification of Data Authenticity vulnerability in Nextcloud Server
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform.
network
low complexity
nextcloud CWE-345
4.3
2022-04-21 CVE-2022-20795 Insufficient Verification of Data Authenticity vulnerability in Cisco Adaptive Security Appliance
A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-345
7.5
2022-04-21 CVE-2020-14116 Insufficient Verification of Data Authenticity vulnerability in MI Browser
An intent redirection vulnerability in the Mi Browser product.
network
low complexity
mi CWE-345
7.5
2022-04-21 CVE-2020-14122 Insufficient Verification of Data Authenticity vulnerability in MI Miui 12.5.2
Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage.
local
low complexity
mi CWE-345
5.5
2022-04-20 CVE-2022-26516 Insufficient Verification of Data Authenticity vulnerability in Redlion Da50N Firmware
Authorized users may install a maliciously modified package file when updating the device via the web user interface.
local
low complexity
redlion CWE-345
7.8
2022-04-19 CVE-2021-26625 Insufficient Verification of Data Authenticity vulnerability in Tobesoft Nexacro 17.1.2.500/17.1.2.600/17.1.3.301
Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform.
network
low complexity
tobesoft CWE-345
8.8
2022-03-29 CVE-2022-26871 Insufficient Verification of Data Authenticity vulnerability in Trendmicro Apex Central and Apex ONE
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
network
low complexity
trendmicro CWE-345
critical
9.8
2022-03-18 CVE-2021-4031 Insufficient Verification of Data Authenticity vulnerability in Syltek
Syltek application before its 10.22.00 version, does not correctly check that a product ID has a valid payment associated to it.
network
low complexity
syltek CWE-345
7.5
2022-03-16 CVE-2021-39689 Insufficient Verification of Data Authenticity vulnerability in Google Android 12.0
In multiple functions of odsign_main.cpp, there is a possible way to persist system attack due to a logic error in the code.
local
low complexity
google CWE-345
6.7
2022-03-10 CVE-2020-14111 Insufficient Verification of Data Authenticity vulnerability in MI Ax3600 Firmware 1.0.50/1.0.67/1.1.12
A command injection vulnerability exists in the Xiaomi Router AX3600.
local
low complexity
mi CWE-345
7.8