Vulnerabilities > Insufficient Verification of Data Authenticity

DATE CVE VULNERABILITY TITLE RISK
2016-11-25 CVE-2016-9450 Insufficient Verification of Data Authenticity vulnerability in Drupal
The user password reset form in Drupal 8.x before 8.2.3 allows remote attackers to conduct cache poisoning attacks by leveraging failure to specify a correct cache context.
network
low complexity
drupal CWE-345
7.5
2016-06-13 CVE-2016-3677 Insufficient Verification of Data Authenticity vulnerability in Huawei Hilink APP and Wear APP
The Huawei Wear App application before 15.0.0.307 for Android does not validate SSL certificates, which allows local users to have unspecified impact via unknown vectors, aka HWPSIRT-2016-03008.
network
low complexity
huawei CWE-345
6.5
2016-05-30 CVE-2016-2309 Insufficient Verification of Data Authenticity vulnerability in IRZ Ruh2
iRZ RUH2 before 2b does not validate firmware patches, which allows remote authenticated users to modify data or cause a denial of service via unspecified vectors.
network
low complexity
irz CWE-345
7.2
2016-05-10 CVE-2016-4554 Insufficient Verification of Data Authenticity vulnerability in multiple products
mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
network
low complexity
oracle squid-cache canonical CWE-345
8.6
2016-05-10 CVE-2016-4553 Insufficient Verification of Data Authenticity vulnerability in multiple products
client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
network
low complexity
canonical squid-cache oracle CWE-345
8.6
2016-04-25 CVE-2016-2346 Insufficient Verification of Data Authenticity vulnerability in Allroundautomations Pl/Sql Developer
Allround Automations PL/SQL Developer 11 before 11.0.6 relies on unverified HTTP data for updates, which allows man-in-the-middle attackers to execute arbitrary code by modifying fields in the client-server data stream.
network
high complexity
allroundautomations CWE-345
8.1
2016-04-08 CVE-2016-3983 Insufficient Verification of Data Authenticity vulnerability in Mcafee Advanced Threat Defense
McAfee Advanced Threat Defense (ATD) before 3.4.8.178 might allow remote attackers to bypass malware detection by leveraging information about the parent process.
network
low complexity
mcafee CWE-345
7.5
2016-03-24 CVE-2015-6854 Insufficient Verification of Data Authenticity vulnerability in Broadcom Single Sign-On
The non-Domino web agents in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, and R12.5 before CR5 allow remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
network
low complexity
broadcom CWE-345
critical
9.1
2016-03-24 CVE-2015-6853 Insufficient Verification of Data Authenticity vulnerability in Broadcom Single Sign-On
The Domino web agent in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, R12.5 before CR5, R12.51 before CR4, and R12.52 before SP1 CR3 allows remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
network
low complexity
broadcom CWE-345
critical
9.1
2016-03-14 CVE-2016-1731 Insufficient Verification of Data Authenticity vulnerability in Apple Software Update
Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream.
network
high complexity
apple CWE-345
5.9