Total
425 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-34715 | 1 Cisco | 2 Expressway, Telepresence Video Communication Server | 2023-11-07 | 9.0 HIGH | 7.2 HIGH |
A vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges (the _nobody account) on the underlying operating system. | |||||
CVE-2021-28091 | 3 Debian, Entrouvert, Fedoraproject | 3 Debian Linux, Lasso, Fedora | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature. | |||||
CVE-2021-22160 | 1 Apache | 1 Pulsar | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins). | |||||
CVE-2021-1453 | 1 Cisco | 1 Ios Xe | 2023-11-07 | 7.2 HIGH | 6.8 MEDIUM |
A vulnerability in the software image verification functionality of Cisco IOS XE Software for the Cisco Catalyst 9000 Family of switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. The vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated physical access to the device or obtain privileged access to the root shell on the device. | |||||
CVE-2021-1136 | 1 Cisco | 7 8201, 8202, 8808 and 4 more | 2023-11-07 | 4.6 MEDIUM | 6.7 MEDIUM |
Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | |||||
CVE-2021-1244 | 1 Cisco | 7 8201, 8202, 8808 and 4 more | 2023-11-07 | 4.6 MEDIUM | 6.7 MEDIUM |
Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | |||||
CVE-2020-8133 | 1 Nextcloud | 1 Nextcloud Server | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file. | |||||
CVE-2020-9283 | 2 Debian, Golang | 2 Debian Linux, Package Ssh | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client. | |||||
CVE-2020-5407 | 1 Pivotal Software | 1 Spring Security | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid. | |||||
CVE-2020-16154 | 2 App\, Fedoraproject | 2 \, Fedora | 2023-11-07 | 6.8 MEDIUM | 7.8 HIGH |
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass. | |||||
CVE-2020-16156 | 2 Fedoraproject, Perl | 2 Fedora, Comprehensive Perl Archive Network | 2023-11-07 | 6.8 MEDIUM | 7.8 HIGH |
CPAN 2.28 allows Signature Verification Bypass. | |||||
CVE-2020-15216 | 2 Fedoraproject, Goxmldsig Project | 2 Fedora, Goxmldsig | 2023-11-07 | 4.3 MEDIUM | 6.5 MEDIUM |
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0 | |||||
CVE-2020-12244 | 4 Debian, Fedoraproject, Opensuse and 1 more | 5 Debian Linux, Fedora, Backports Sle and 2 more | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. | |||||
CVE-2020-11539 | 1 Titan | 2 Sf Rush Smart Band, Sf Rush Smart Band Firmware | 2023-11-07 | 4.8 MEDIUM | 8.1 HIGH |
An issue was discovered on Tata Sonata Smart SF Rush 1.12 devices. It has been identified that the smart band has no pairing (mode 0 Bluetooth LE security level) The data being transmitted over the air is not encrypted. Adding to this, the data being sent to the smart band doesn't have any authentication or signature verification. Thus, any attacker can control a parameter of the device. | |||||
CVE-2019-3465 | 3 Debian, Simplesamlphp, Xmlseclibs Project | 3 Debian Linux, Simplesamlphp, Xmlseclibs | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message. | |||||
CVE-2019-12269 | 1 Enigmail | 1 Enigmail | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a "correctly signed" message indication, but display different unauthenticated text. | |||||
CVE-2018-7685 | 1 Opensuse | 1 Libzypp | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download. | |||||
CVE-2018-6664 | 2 Mcafee, Microsoft | 2 Data Loss Prevention Endpoint, Windows | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
Application Protections Bypass vulnerability in Microsoft Windows in McAfee Data Loss Prevention (DLP) Endpoint before 10.0.500 and DLP Endpoint before 11.0.400 allows authenticated users to bypass the product block action via a command-line utility. | |||||
CVE-2018-6459 | 1 Strongswan | 1 Strongswan | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter. | |||||
CVE-2018-16515 | 2 Debian, Matrix | 2 Debian Linux, Synapse | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation. |