Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-10-16 | CVE-2020-9885 | Insufficient Verification of Data Authenticity vulnerability in Apple products An issue existed in the handling of iMessage tapbacks. | 5.5 |
2020-10-16 | CVE-2020-26893 | Insufficient Verification of Data Authenticity vulnerability in Clamxav An issue was discovered in ClamXAV 3 before 3.1.1. | 7.8 |
2020-10-12 | CVE-2020-9230 | Insufficient Verification of Data Authenticity vulnerability in Huawei Ws5800-10 Firmware 10.0.3.25 WS5800-10 version 10.0.3.25 has a denial of service vulnerability. | 6.5 |
2020-09-24 | CVE-2020-15222 | Insufficient Verification of Data Authenticity vulnerability in ORY Fosite In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using "private_key_jwt" authentication the uniqueness of the `jti` value is not checked. | 8.1 |
2020-09-23 | CVE-2019-16000 | Insufficient Verification of Data Authenticity vulnerability in Cisco Umbrella Roaming Client 2.2.238 A vulnerability in the automatic update process of Cisco Umbrella Roaming Client for Windows could allow an authenticated, local attacker to install arbitrary, unapproved applications on a targeted device. | 4.4 |
2020-09-23 | CVE-2019-16007 | Insufficient Verification of Data Authenticity vulnerability in Cisco Anyconnect Secure Mobility Client A vulnerability in the inter-service communication of Cisco AnyConnect Secure Mobility Client for Android could allow an unauthenticated, local attacker to perform a service hijack attack on an affected device or cause a denial of service (DoS) condition. | 7.1 |
2020-09-17 | CVE-2020-24045 | Insufficient Verification of Data Authenticity vulnerability in Titanhq Spamtitan 7.07 A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. | 7.2 |
2020-09-09 | CVE-2020-15163 | Insufficient Verification of Data Authenticity vulnerability in Linuxfoundation the Update Framework Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. | 8.2 |
2020-09-04 | CVE-2020-11493 | Insufficient Verification of Data Authenticity vulnerability in Foxitsoftware Phantompdf In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject. | 8.1 |
2020-08-29 | CVE-2020-25019 | Insufficient Verification of Data Authenticity vulnerability in Jitsi Meet Electron jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances. | 7.5 |