Vulnerabilities > Insufficient Verification of Data Authenticity

DATE CVE VULNERABILITY TITLE RISK
2016-04-08 CVE-2016-3983 Insufficient Verification of Data Authenticity vulnerability in Mcafee Advanced Threat Defense
McAfee Advanced Threat Defense (ATD) before 3.4.8.178 might allow remote attackers to bypass malware detection by leveraging information about the parent process.
network
low complexity
mcafee CWE-345
7.5
2016-03-24 CVE-2015-6854 Insufficient Verification of Data Authenticity vulnerability in Broadcom Single Sign-On
The non-Domino web agents in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, and R12.5 before CR5 allow remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
network
low complexity
broadcom CWE-345
critical
9.1
2016-03-24 CVE-2015-6853 Insufficient Verification of Data Authenticity vulnerability in Broadcom Single Sign-On
The Domino web agent in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, R12.5 before CR5, R12.51 before CR4, and R12.52 before SP1 CR3 allows remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
network
low complexity
broadcom CWE-345
critical
9.1
2016-03-14 CVE-2016-1731 Insufficient Verification of Data Authenticity vulnerability in Apple Software Update
Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream.
network
high complexity
apple CWE-345
5.9
2016-03-12 CVE-2016-0818 Insufficient Verification of Data Authenticity vulnerability in Google Android
The caching functionality in the TrustManagerImpl class in TrustManagerImpl.java in Conscrypt in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 mishandles the distinction between an intermediate CA and a trusted root CA, which allows man-in-the-middle attackers to spoof servers by leveraging access to an intermediate CA to issue a certificate, aka internal bug 26232830.
network
high complexity
google CWE-345
5.9
2016-02-03 CVE-2015-7539 Insufficient Verification of Data Authenticity vulnerability in multiple products
The Plugins Manager in Jenkins before 1.640 and LTS before 1.625.2 does not verify checksums for plugin files referenced in update site data, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted plugin.
network
high complexity
jenkins redhat CWE-345
7.5
2016-01-29 CVE-2016-1493 Insufficient Verification of Data Authenticity vulnerability in Intel Driver Update Utility
Intel Driver Update Utility before 2.4 retrieves driver updates in cleartext, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
network
high complexity
intel CWE-345
7.5
2015-12-27 CVE-2015-8254 Insufficient Verification of Data Authenticity vulnerability in RSI Video Technologies Frontel Protocol 2.0
The Frontel protocol before 3 on RSI Video Technologies Videofied devices does not use integrity protection, which makes it easier for man-in-the-middle attackers to (1) initiate a false alarm or (2) deactivate an alarm by modifying the client-server data stream.
network
high complexity
rsi-video-technologies CWE-345
5.9