Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-29 | CVE-2019-19160 | Insufficient Verification of Data Authenticity vulnerability in Cabsoftware Reportexpress Proplus Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp). | 8.8 |
2020-06-25 | CVE-2020-5964 | Insufficient Verification of Data Authenticity vulnerability in Nvidia products NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the service host component, in which the application resources integrity check may be missed. | 7.8 |
2020-06-19 | CVE-2020-13272 | Insufficient Verification of Data Authenticity vulnerability in Gitlab OAuth flow missing verification checks CE/EE 12.3 and later through 13.0.1 allows unverified user to use OAuth authorization code flow | 8.8 |
2020-06-19 | CVE-2020-13265 | Insufficient Verification of Data Authenticity vulnerability in Gitlab User email verification bypass in GitLab CE/EE 12.5 and later through 13.0.1 allows user to bypass email verification | 5.3 |
2020-06-19 | CVE-2020-14453 | Insufficient Verification of Data Authenticity vulnerability in Mattermost Server An issue was discovered in Mattermost Server before 5.21.0. | 7.5 |
2020-06-11 | CVE-2020-6090 | Insufficient Verification of Data Authenticity vulnerability in Wago Pfc200 Firmware 03.03.10(15) An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). | 7.2 |
2020-06-03 | CVE-2020-3220 | Insufficient Verification of Data Authenticity vulnerability in Cisco IOS XE A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. | 6.8 |
2020-05-07 | CVE-2020-6081 | Insufficient Verification of Data Authenticity vulnerability in Codesys Runtime 3.5.14.30 An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. | 8.8 |
2020-04-22 | CVE-2020-7487 | Insufficient Verification of Data Authenticity vulnerability in Schneider-Electric products A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists which could allow the attacker to execute malicious code on the Modicon M218, M241, M251, and M258 controllers. | 9.8 |
2020-04-14 | CVE-2019-11480 | Insufficient Verification of Data Authenticity vulnerability in Canonical C-Kernel 20190716 The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. | 8.1 |