Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-13 | CVE-2023-20570 | Insufficient Verification of Data Authenticity vulnerability in AMD products Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams. | 3.3 |
2023-12-24 | CVE-2023-51765 | Insufficient Verification of Data Authenticity vulnerability in multiple products sendmail through 8.17.2 allows SMTP smuggling in certain configurations. | 5.3 |
2023-12-24 | CVE-2023-51766 | Insufficient Verification of Data Authenticity vulnerability in multiple products Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. | 5.3 |
2023-12-24 | CVE-2023-51764 | Insufficient Verification of Data Authenticity vulnerability in multiple products Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). | 5.3 |
2023-12-21 | CVE-2023-51655 | Insufficient Verification of Data Authenticity vulnerability in Jetbrains Intellij Idea In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration | 9.8 |
2023-12-11 | CVE-2023-45292 | Insufficient Verification of Data Authenticity vulnerability in Mojotv Base64Captcha When using the default implementation of Verify to check a Captcha, verification can be bypassed. | 5.3 |
2023-11-14 | CVE-2023-46445 | Insufficient Verification of Data Authenticity vulnerability in Asyncssh Project Asyncssh An issue in AsyncSSH before 2.14.1 allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack, aka a "Rogue Extension Negotiation." | 5.9 |
2023-11-09 | CVE-2023-5548 | Insufficient Verification of Data Authenticity vulnerability in multiple products Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection. | 5.3 |
2023-11-01 | CVE-2023-5482 | Insufficient Verification of Data Authenticity vulnerability in multiple products Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. | 8.8 |
2023-10-19 | CVE-2023-41896 | Insufficient Verification of Data Authenticity vulnerability in Home-Assistant Home-Assistant-Js-Websocket Home assistant is an open source home automation. | 9.0 |