Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router.
Max CVSS
7.5
EPSS Score
2.14%
Published
2002-12-31
Updated
2024-02-08
ChaiVM EZloader for HP color LaserJet 4500 and 4550 and HP LaserJet 4100 and 8150 does not properly verify JAR signatures for new services, which allows local users to load unauthorized Chai services.
Max CVSS
7.8
EPSS Score
0.04%
Published
2002-12-31
Updated
2024-02-08
Cisco 7940/7960 Voice over IP (VoIP) phones do not properly check the Call-ID, branch, and tag values in a NOTIFY message to verify a subscription, which allows remote attackers to spoof messages such as the "Messages waiting" message.
Max CVSS
7.5
EPSS Score
0.33%
Published
2005-07-11
Updated
2024-02-08
Grandstream BudgeTone (BT) 100 Voice over IP (VoIP) phones do not properly check the Call-ID, branch, and tag values in a NOTIFY message to verify a subscription, which allows remote attackers to spoof messages such as the "Messages waiting" message.
Max CVSS
7.5
EPSS Score
0.47%
Published
2005-07-11
Updated
2024-02-08
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
Max CVSS
4.3
EPSS Score
0.16%
Published
2019-11-26
Updated
2021-02-09
Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
Max CVSS
5.0
EPSS Score
0.36%
Published
2012-02-09
Updated
2020-04-16
A Security Bypass vulnerability exists in Ubuntu Cobbler before 2,2,2 in the cobbler-ubuntu-import script due to an error when verifying the GPG signature.
Max CVSS
5.9
EPSS Score
2.42%
Published
2019-12-06
Updated
2019-12-17
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
Max CVSS
5.0
EPSS Score
2.92%
Published
2014-03-19
Updated
2020-08-14
redhat-upgrade-tool: Does not check GPG signatures when upgrading versions
Max CVSS
10.0
EPSS Score
0.21%
Published
2019-11-22
Updated
2023-02-13
A PKCS#1 v1.5 signature verification routine in all Android releases from CAF using the Linux kernel may not check padding.
Max CVSS
9.3
EPSS Score
0.10%
Published
2017-05-16
Updated
2017-07-11
Yubico ykneo-openpgp before 1.0.10 has a typo in which an invalid PIN can be used. When first powered up, a signature will be issued even though the PIN has not been validated.
Max CVSS
8.8
EPSS Score
0.08%
Published
2022-03-30
Updated
2022-04-08
MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow the signature check of an update to be bypassed.
Max CVSS
7.5
EPSS Score
0.08%
Published
2020-03-27
Updated
2020-04-01
A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage
Max CVSS
7.5
EPSS Score
0.20%
Published
2020-07-21
Updated
2020-07-23
Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.
Max CVSS
5.0
EPSS Score
0.46%
Published
2017-03-14
Updated
2017-09-03
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
Max CVSS
4.4
EPSS Score
0.06%
Published
2018-07-11
Updated
2019-10-09
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (with Fingerprint support) software. The check of an application's signature can be bypassed during installation. The Samsung ID is SVE-2016-5923 (June 2016).
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-04-07
Updated
2020-04-07
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.
Max CVSS
9.8
EPSS Score
0.06%
Published
2024-01-12
Updated
2024-01-22
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
Max CVSS
7.5
EPSS Score
0.36%
Published
2018-06-01
Updated
2023-10-06
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
Max CVSS
7.5
EPSS Score
0.53%
Published
2018-06-04
Updated
2020-10-20
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. The issue involves the "Security" component. It allows remote attackers to bypass intended access restrictions by leveraging a successful result from a SecKeyRawVerify API call with an empty signature.
Max CVSS
9.8
EPSS Score
0.95%
Published
2017-04-02
Updated
2019-10-03
GIGABYTE BRIX UEFI firmware does not cryptographically validate images prior to updating the system firmware. Additionally, the firmware updates are served over HTTP. An attacker can make arbitrary modifications to firmware images without being detected.
Max CVSS
10.0
EPSS Score
1.04%
Published
2018-07-09
Updated
2019-10-09
Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.
Max CVSS
6.5
EPSS Score
0.63%
Published
2017-10-27
Updated
2022-04-08
The auto-update feature of Open Embedded Linux Entertainment Center (OpenELEC) 6.0.3, 7.0.1, and 8.0.4 uses neither encrypted connections nor signed updates. A man-in-the-middle attacker could manipulate the update packages to gain root access remotely.
Max CVSS
8.1
EPSS Score
0.29%
Published
2017-03-05
Updated
2019-10-03
Huawei APP HiWallet earlier than 5.0.3.100 versions do not support signature verification for APK file. An attacker could exploit this vulnerability to hijack the APK and upload modified APK file. Successful exploit could lead to the APP is hijacking.
Max CVSS
5.3
EPSS Score
0.08%
Published
2017-11-22
Updated
2017-12-11
FusionSphere OpenStack V100R006C00SPC102(NFV)has an improper verification of cryptographic signature vulnerability. The software does not verify the cryptographic signature. An attacker with high privilege may exploit this vulnerability to inject malicious software.
Max CVSS
6.7
EPSS Score
0.04%
Published
2017-11-22
Updated
2017-12-08
388 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!