Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-29 | CVE-2019-19160 | Insufficient Verification of Data Authenticity vulnerability in Cabsoftware Reportexpress Proplus Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp). | 6.5 |
2020-06-19 | CVE-2020-13265 | Insufficient Verification of Data Authenticity vulnerability in Gitlab User email verification bypass in GitLab CE/EE 12.5 and later through 13.0.1 allows user to bypass email verification | 5.0 |
2020-06-19 | CVE-2020-14453 | Insufficient Verification of Data Authenticity vulnerability in Mattermost Server An issue was discovered in Mattermost Server before 5.21.0. | 5.0 |
2020-06-11 | CVE-2020-6090 | Insufficient Verification of Data Authenticity vulnerability in Wago Pfc200 Firmware 03.03.10(15) An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). | 7.2 |
2020-06-03 | CVE-2020-3220 | Insufficient Verification of Data Authenticity vulnerability in Cisco IOS XE A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. | 7.1 |
2020-05-07 | CVE-2020-6081 | Insufficient Verification of Data Authenticity vulnerability in Codesys Runtime 3.5.14.30 An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. | 6.5 |
2020-04-22 | CVE-2020-7487 | Insufficient Verification of Data Authenticity vulnerability in Schneider-Electric products A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists which could allow the attacker to execute malicious code on the Modicon M218, M241, M251, and M258 controllers. | 7.5 |
2020-04-14 | CVE-2019-11480 | Insufficient Verification of Data Authenticity vulnerability in Canonical C-Kernel The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. | 6.8 |
2020-04-13 | CVE-2020-6443 | Insufficient Verification of Data Authenticity vulnerability in multiple products Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page. | 8.8 |
2020-04-13 | CVE-2019-1866 | Insufficient Verification of Data Authenticity vulnerability in Cisco Webex Business Suite 39 Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. | 4.3 |