Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Weak Cryptography
Category ID:959
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
1230Vulnerabilities found

CVE-2024-11957
Assigner-ESET, spol. s r.o.
ShareView Details
Assigner-ESET, spol. s r.o.
CVSS Score-9.3||CRITICAL
EPSS-0.01% / 1.87%
||
7 Day CHG~0.00%
Published-04 Mar, 2025 | 15:41
Updated-05 Mar, 2025 | 08:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Execution in WPS Office

Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276 on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough.

Action-Not Available
Vendor-Kingsoft
Product-WPS Office
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-27498
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.01% / 1.57%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:52
Updated-03 Mar, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AEADs/ascon-aead: Plaintext exposed in decrypt_in_place_detached even on tag verification failure

aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3.

Action-Not Available
Vendor-RustCrypto
Product-AEADs
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-1570
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.1||HIGH
EPSS-0.07% / 23.06%
||
7 Day CHG~0.00%
Published-28 Feb, 2025 | 08:23
Updated-28 Feb, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings <= 8.1 - Privilege Escalation and Account Takeover via Weak OTP

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

Action-Not Available
Vendor-wpwax
Product-Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2023-25574
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-0.07% / 21.05%
||
7 Day CHG~0.00%
Published-25 Feb, 2025 | 14:42
Updated-25 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JupyterHub's LTI13Authenticator: JWT signature not validated

`jupyterhub-ltiauthenticator` is a JupyterHub authenticator for learning tools interoperability (LTI). LTI13Authenticator that was introduced in `jupyterhub-ltiauthenticator` 1.3.0 wasn't validating JWT signatures. This is believed to allow the LTI13Authenticator to authorize a forged request. Only users that has configured a JupyterHub installation to use the authenticator class `LTI13Authenticator` are affected. `jupyterhub-ltiauthenticator` version 1.4.0 removes LTI13Authenticator to address the issue. No known workarounds are available.

Action-Not Available
Vendor-jupyterhub
Product-ltiauthenticator
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-1231
Assigner-Devolutions Inc.
ShareView Details
Assigner-Devolutions Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 12.81%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 14:05
Updated-28 Mar, 2025 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.

Action-Not Available
Vendor-Devolutions
Product-devolutions_serverServer
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-54089
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.02% / 3.76%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 10:29
Updated-12 Feb, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain a weak encryption mechanism based on a hard-coded key. This could allow an attacker to guess or decrypt the password from the cyphertext.

Action-Not Available
Vendor-Siemens AG
Product-APOGEE PXC Series (P2 Ethernet)APOGEE PXC Series (BACnet)TALON TC Series (BACnet)
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2022-37660
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.14%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 00:00
Updated-13 Feb, 2025 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CVE-2024-10237
Assigner-def9a96e-e099-41a9-bfac-30fd4f82c411
ShareView Details
Assigner-def9a96e-e099-41a9-bfac-30fd4f82c411
CVSS Score-7.2||HIGH
EPSS-0.03% / 5.42%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 07:59
Updated-04 Feb, 2025 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMC BMC Firmware Image Authentication Design Issue

There is a vulnerability in the BMC firmware image authentication design at Supermicro MBD-X12DPG-OA6 . An attacker can modify the firmware to bypass BMC inspection and bypass the signature verification process

Action-Not Available
Vendor-SMCI
Product-MBD-X12DPG-OA6
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-56161
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.2||HIGH
EPSS-0.01% / 0.69%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 17:24
Updated-02 Apr, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD EPYC™ 7002 SeriesAMD EPYC™ 7003 SeriesAMD EPYC™ 9004 SeriesAMD EPYC™ 7001 Series
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-24800
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.02% / 3.84%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 15:41
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Critical vulnerability in `ismp-grandpa` <v15.0.1

Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. This could be used to steal funds or compromise other kinds of cross-chain applications. This vulnerability is fixed in 15.0.1.

Action-Not Available
Vendor-polytope-labs
Product-hyperbridge
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2025-23369
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Assigner-GitHub, Inc. (Products Only)
CVSS Score-7.6||HIGH
EPSS-8.75% / 92.14%
||
7 Day CHG+0.85%
Published-21 Jan, 2025 | 18:46
Updated-12 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Verification of Cryptographic Signature in GitHub Enterprise Server Allows Signature Spoofing by Improper Validation

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. This vulnerability was reported via the GitHub Bug Bounty program.

Action-Not Available
Vendor-GitHub, Inc.
Product-Enterprise Server
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-13454
Assigner-OpenVPN Inc.
ShareView Details
Assigner-OpenVPN Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.87%
||
7 Day CHG~0.00%
Published-20 Jan, 2025 | 21:07
Updated-22 Aug, 2025 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3

Action-Not Available
Vendor-openvpnOpenVPN
Product-easy-rsaEasy-RSA
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2025-23206
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-1.8||LOW
EPSS-0.05% / 14.69%
||
7 Day CHG~0.00%
Published-17 Jan, 2025 | 20:34
Updated-17 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IAM OIDC custom resource allows connection to unauthorized OIDC provider in aws-cdk

The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-aws
Product-aws-cdk
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-13026
Assigner-5cdcf916-2b10-4ec8-bfc1-d054821e439e
ShareView Details
Assigner-5cdcf916-2b10-4ec8-bfc1-d054821e439e
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 4.37%
||
7 Day CHG-0.00%
Published-17 Jan, 2025 | 20:02
Updated-12 Feb, 2025 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Inadequate Encryption Strength Vulnerability in Roche Algo Edge

A vulnerability exists in Algo Edge up to 2.1.1 - a previously used (legacy) component of navify® Algorithm Suite. The vulnerability impacts the authentication mechanism of this component and could allow an attacker with adjacent access to the laboratory network and the Algo Edge system to craft valid authentication tokens and access the component. Other components of navify® Algorithm Suite are not affected.

Action-Not Available
Vendor-Roche Diagnostics
Product-Algorithm Suite
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-13172
Assigner-Ivanti
ShareView Details
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.46%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 17:16
Updated-11 Jul, 2025 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper signature verification in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_managerEndpoint Manager
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7344
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.10% / 28.04%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 13:29
Updated-12 Feb, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

Action-Not Available
Vendor-greenwaresignalcomputerradixhowyarwasaysanfongcs-grpCES TaiwanGreenware TechnologiesRadixSignalComputerSANFONGHowyar Technologies
Product-hdd_kingerecoveryrxgreenguardsmart_recoveryez-back_systemneo_impactsysreturnSANFONG EZ-Back SystemSmartRecoveryGreenGuardCES NeoImpactHDD KingSysReturn (32-bit and 64-bit)
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-22144
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9||CRITICAL
EPSS-0.11% / 30.25%
||
7 Day CHG~0.00%
Published-13 Jan, 2025 | 19:49
Updated-13 May, 2025 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Account Takeover in NamelessMC

NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-namelessmcNamelessMC
Product-namelessNameless
CWE ID-CWE-610
Externally Controlled Reference to a Resource in Another Sphere
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-47519
Assigner-Arista Networks, Inc.
ShareView Details
Assigner-Arista Networks, Inc.
CVSS Score-8.3||HIGH
EPSS-0.08% / 25.16%
||
7 Day CHG~0.00%
Published-10 Jan, 2025 | 21:56
Updated-13 Jan, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Backup uploads to ETM subject to man-in-the-middle interception

Backup uploads to ETM subject to man-in-the-middle interception

Action-Not Available
Vendor-Arista Networks, Inc.
Product-Arista Edge Threat Management
CWE ID-CWE-322
Key Exchange without Entity Authentication
CVE-2025-0331
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 19.86%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 04:31
Updated-09 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
YunzMall HTTP POST Request ResetpwdController.php changePwd password recovery

A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-n/a
Product-YunzMall
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-11350
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 30.99%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 08:18
Updated-12 Aug, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AdForest <= 5.1.6 - Privilege Escalation via Password Reset/Account Takeover

The AdForest theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.1.6. This is due to the plugin not properly validating a user's identity prior to updating their password through the adforest_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

Action-Not Available
Vendor-ScriptsBundle
Product-adforestAdForest
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-54150
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.05% / 15.48%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 18:22
Updated-20 Dec, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Algorithm Confusion Vulnerability in cjwt

cjwt is a C JSON Web Token (JWT) Implementation. Algorithm confusion occurs when a system improperly verifies the type of signature used, allowing attackers to exploit the lack of distinction between signing methods. If the system doesn't differentiate between an HMAC signed token and an RS/EC/PS signed token during verification, it becomes vulnerable to this kind of attack. For instance, an attacker could craft a token with the alg field set to "HS256" while the server expects an asymmetric algorithm like "RS256". The server might mistakenly use the wrong verification method, such as using a public key as the HMAC secret, leading to unauthorised access. For RSA, the key can be computed from a few signatures. For Elliptic Curve (EC), two potential keys can be recovered from one signature. This can be used to bypass the signature mechanism if an application relies on asymmetrically signed tokens. This issue has been addressed in version 2.3.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-xmidt-org
Product-cjwt
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-43106
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.25% / 47.83%
||
7 Day CHG+0.09%
Published-18 Dec, 2024 | 22:41
Updated-22 Aug, 2025 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft Excel 16.83 for macOS. A specially crafted library can leverage Excel's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-excelExcel
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-42220
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.25% / 47.83%
||
7 Day CHG+0.09%
Published-18 Dec, 2024 | 22:40
Updated-22 Aug, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-outlookOutlook
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-42004
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.23% / 45.54%
||
7 Day CHG+0.07%
Published-18 Dec, 2024 | 22:40
Updated-26 Aug, 2025 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-teamsTeams (work or school)
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-41165
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.23% / 46.07%
||
7 Day CHG+0.08%
Published-18 Dec, 2024 | 22:39
Updated-22 Aug, 2025 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft Word 16.83 for macOS. A specially crafted library can leverage Word's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-wordWord
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-41159
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.40%
||
7 Day CHG-0.07%
Published-18 Dec, 2024 | 22:39
Updated-25 Aug, 2025 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft OneNote 16.83 for macOS. A specially crafted library can leverage OneNote's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-onenoteOneNote
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-41145
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.19% / 41.53%
||
7 Day CHG+0.05%
Published-18 Dec, 2024 | 22:38
Updated-26 Aug, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-teamsTeams (work or school)
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-41138
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.22% / 44.16%
||
7 Day CHG+0.05%
Published-18 Dec, 2024 | 22:38
Updated-26 Aug, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-teamsTeams (work or school)
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-39804
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.23% / 46.07%
||
7 Day CHG+0.08%
Published-18 Dec, 2024 | 22:37
Updated-25 Aug, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A library injection vulnerability exists in Microsoft PowerPoint 16.83 for macOS. A specially crafted library can leverage PowerPoint's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.

Action-Not Available
Vendor-Microsoft Corporation
Product-powerpointPowerPoint
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-22461
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-8.8||HIGH
EPSS-0.57% / 67.48%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 13:25
Updated-04 Feb, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system.

Action-Not Available
Vendor-Dell Inc.
Product-recoverpoint_for_virtual_machinesRecoverPoint for Virtual Machines
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-53552
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.79%
||
7 Day CHG+0.01%
Published-10 Dec, 2024 | 00:00
Updated-27 Jun, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CrushFTP 10 before 10.8.3 and 11 before 11.2.3 mishandles password reset, leading to account takeover.

Action-Not Available
Vendor-crushftpn/a
Product-crushftpn/a
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-47547
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 35.76%
||
7 Day CHG~0.00%
Published-06 Dec, 2024 | 18:00
Updated-10 Dec, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ruijie Reyee OS Weak Password Recovery Mechanism for Forgotten Password

Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks.

Action-Not Available
Vendor-Ruijie Networks Co., Ltd.
Product-reyee_osReyee OSreyee_os
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-11022
Assigner-SICK AG
ShareView Details
Assigner-SICK AG
CVSS Score-5.6||MEDIUM
EPSS-0.17% / 38.08%
||
7 Day CHG+0.01%
Published-06 Dec, 2024 | 12:13
Updated-06 Dec, 2024 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SICK InspectorP61x and SICK InspectorP62x are vulnerable for a replay attack

The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is therefore vulnerable for a replay attack.

Action-Not Available
Vendor-SICK AG
Product-SICK InspectorP62xSICK InspectorP61x
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CVE-2024-54126
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.03%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 12:14
Updated-05 Dec, 2024 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient Integrity Verification Vulnerability in TP-Link Archer C50

This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-Archer C50 Wireless Routerarcher_c50_firmware
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-47476
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.16%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 09:59
Updated-03 Feb, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell NetWorker Management Console, version(s) 19.11, contain(s) an Improper Verification of Cryptographic Signature vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Code execution.

Action-Not Available
Vendor-Dell Inc.
Product-networker_management_consoleNetWorker Management Consolenetworker_management_console
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-49413
Assigner-Samsung Mobile
ShareView Details
Assigner-Samsung Mobile
CVSS Score-7.1||HIGH
EPSS-0.03% / 8.48%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 05:47
Updated-10 Feb, 2025 | 22:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Verification of Cryptographic Signature in SmartSwitch prior to SMR Dec-2024 Release 1 allows local attackers to install malicious applications.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devicesandroid
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-11103
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.79%
||
7 Day CHG-0.01%
Published-28 Nov, 2024 | 09:47
Updated-11 Apr, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Contest Gallery <= 24.0.7 - Unauthenticated Arbitrary Password Reset to Privilege Escalation/Account Takeover

The Contest Gallery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 24.0.7. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

Action-Not Available
Vendor-contest-gallerycontest-gallerycontest_gallery
Product-contest_galleryPhotos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttonscontest_gallery
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-52958
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-9.3||CRITICAL
EPSS-0.14% / 34.23%
||
7 Day CHG~0.00%
Published-27 Nov, 2024 | 05:22
Updated-27 Nov, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iota C.ai Conversational Platform - Improper Verification of Cryptographic Signature

A improper verification of cryptographic signature vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to load a malicious DLL via upload plugin function.

Action-Not Available
Vendor-Galaxy Software Services Corporationgalaxy_software_services_corporation
Product-iota C.ai Conversational Platformiota_c.ai_conversational_platform
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-53267
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.28%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 18:41
Updated-26 Nov, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vulnerability with bundle verification in sigstore-java

sigstore-java is a sigstore java client for interacting with sigstore infrastructure. sigstore-java has insufficient verification for a situation where a validly-signed but "mismatched" bundle is presented as proof of inclusion into a transparency log. This bug impacts clients using any variation of KeylessVerifier.verify(). The verifier may accept a bundle with an unrelated log entry, cryptographically verifying everything but fails to ensure the log entry applies to the artifact in question, thereby "verifying" a bundle without any proof the signing event was logged. This allows the creation of a bundle without fulcio certificate and private key combined with an unrelated but time-correct log entry to fake logging of a signing event. A malicious actor using a compromised identity may want to do this to prevent discovery via rekor's log monitors. The signer's identity will still be available to the verifier. The signature on the bundle must still be on the correct artifact for the verifier to pass. sigstore-gradle-plugin and sigstore-maven-plugin are not affected by this as they only provide signing functionality. This issue has been patched in v1.1.0 release with PR #856. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-sigstoresigstore
Product-sigstore-javasigstore-java
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-11696
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 28.31%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 13:33
Updated-02 Dec, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

Action-Not Available
Vendor-Mozilla Corporation
Product-FirefoxFirefox ESRThunderbirdfirefoxthunderbirdfirefox_esr
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-45719
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-2.6||LOW
EPSS-0.07% / 21.51%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 14:36
Updated-01 Jul, 2025 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Answer: Predictable Authorization Token Using UUIDv1

Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.4.0. The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable. Users are recommended to upgrade to version 1.4.1, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-answerApache Answer
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2021-1461
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 15:33
Updated-18 Nov, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Software Signature Verification Bypass Vulnerability

A vulnerability in the Image Signature Verification feature of Cisco&nbsp;SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco&nbsp;has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco SD-WAN vEdge RouterCisco Catalyst SD-WAN Manager
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-52318
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-6.1||MEDIUM
EPSS-2.61% / 85.08%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 12:21
Updated-15 May, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Tomcat: Incorrect JSP tag recycling leads to XSS

Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-tomcatApache Tomcat
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-52317
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-6.5||MEDIUM
EPSS-5.03% / 89.33%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 11:36
Updated-15 May, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Tomcat: Request/response mix-up with HTTP/2

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-tomcatApache Tomcattomcat
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-45670
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.06% / 19.60%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 11:50
Updated-16 Nov, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security SOAR weak password recovery mechanism

IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism.

Action-Not Available
Vendor-IBM Corporation
Product-soarSecurity SOAR
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-40592
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.60%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 18:53
Updated-14 Nov, 2024 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition during the installation process.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientMacforticlientmac
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7516
Assigner-Brocade Communications Systems, LLC
ShareView Details
Assigner-Brocade Communications Systems, LLC
CVSS Score-7||HIGH
EPSS-0.04% / 9.44%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 18:41
Updated-04 Feb, 2025 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brocade Fabric OS before 9.2.2 does not enforce strict host key checking

A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin.

Action-Not Available
Vendor-Broadcom Inc.Brocade Communications Systems, Inc. (Broadcom Inc.)
Product-fabric_operating_systemFabric OS
CWE ID-CWE-322
Key Exchange without Entity Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-49394
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.09%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 02:07
Updated-15 Nov, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

Action-Not Available
Vendor-neomuttmuttRed Hat, Inc.
Product-enterprise_linuxmuttneomuttRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-49393
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.94%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 01:55
Updated-16 Jul, 2025 | 12:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

Action-Not Available
Vendor-neomuttmuttRed Hat, Inc.
Product-muttneomuttenterprise_linuxRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 10
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-47073
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-28.15% / 96.31%
||
7 Day CHG~0.00%
Published-07 Nov, 2024 | 17:31
Updated-20 Feb, 2025 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dataease arbitrary interface access vulnerability

DataEase is an open source data visualization analysis tool that helps users quickly analyze data and gain insights into business trends. In affected versions a the lack of signature verification of jwt tokens allows attackers to forge jwts which then allow access to any interface. The vulnerability has been fixed in v2.10.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-DataEase (FIT2CLOUD Inc.)
Product-dataeasedataeasedataease
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-51526
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-8.2||HIGH
EPSS-0.01% / 0.62%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 09:23
Updated-07 Nov, 2024 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permission control vulnerability in the hidebug module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 24
  • 25
  • Next