Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-08 | CVE-2019-18835 | Insufficient Verification of Data Authenticity vulnerability in Matrix Synapse Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. | 7.5 |
2019-11-05 | CVE-2019-8124 | Insufficient Verification of Data Authenticity vulnerability in Magento An insufficient logging and monitoring vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. | 4.0 |
2019-11-05 | CVE-2019-8112 | Insufficient Verification of Data Authenticity vulnerability in Magento A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. | 5.0 |
2019-10-17 | CVE-2019-6475 | Insufficient Verification of Data Authenticity vulnerability in ISC Bind Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. | 7.5 |
2019-10-08 | CVE-2019-0379 | Insufficient Verification of Data Authenticity vulnerability in SAP Process Integration 1.0/2.0 SAP Process Integration, business-to-business add-on, versions 1.0, 2.0, does not perform authentication check properly when the default security provider is changed to BouncyCastle (BC), leading to Missing Authentication Check | 5.0 |
2019-10-03 | CVE-2019-15162 | Insufficient Verification of Data Authenticity vulnerability in Tcpdump Libpcap rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames. | 5.3 |
2019-09-27 | CVE-2019-11737 | Insufficient Verification of Data Authenticity vulnerability in Mozilla Firefox If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. | 5.0 |
2019-09-18 | CVE-2019-12620 | Insufficient Verification of Data Authenticity vulnerability in Cisco products A vulnerability in the statistics collection service of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to inject arbitrary values on an affected device. | 5.0 |
2019-09-03 | CVE-2019-5478 | Insufficient Verification of Data Authenticity vulnerability in Xilinx products A weakness was found in Encrypt Only boot mode in Zynq UltraScale+ devices. | 2.1 |
2019-08-23 | CVE-2019-6695 | Insufficient Verification of Data Authenticity vulnerability in Fortinet Fortimanager 6.2.0 Lack of root file system integrity checking in Fortinet FortiManager VM application images of 6.2.0, 6.0.6 and below may allow an attacker to implant third-party programs by recreating the image through specific methods. | 9.8 |