CWE-347: CWE-347
Yearly Trend
Top Affected Vendors
All CWE-347 CVEs (181)
The jsrsasign package for Node.js incorrectly validates some invalid RSA PKCS#1 v1.5 signatures as valid, potentially allowing attackers to bypass sig...
Apr 7, 2021CVE-2021-3033 is an authentication bypass vulnerability in Palo Alto Networks Prisma Cloud Compute console that allows attackers to log in as any auth...
Feb 10, 2021CVE-2020-12676 is a SAML authentication bypass vulnerability in FusionAuth's SAMLv2 library that allows attackers to forge authentication messages by ...
Oct 2, 2020CVE-2023-39969 is a critical vulnerability in uthenticode version 1.0.9 where the library incorrectly hashes entire files instead of sections by virtu...
Aug 9, 2023This vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform allows authenticated attackers with normal privileges to modify signed X...
Feb 10, 2026This vulnerability allows network-adjacent attackers to bypass authentication on Samsung SmartThings Hub devices by exploiting improper cryptographic ...
Mar 11, 2025This vulnerability allows unauthorized internal users to spoof cryptographic signatures in GitHub Enterprise Server, potentially bypassing authenticat...
Jan 21, 2025This vulnerability allows an attacker with local unprivileged access on a Windows system to bypass cryptographic signature verification during printer...
Sep 25, 2024IBM WebSphere Application Server 8.5 and 9.0 has an identity spoofing vulnerability where authenticated users can impersonate other users due to impro...
Jun 20, 2024This vulnerability in Zoom Desktop Client and Zoom Rooms for Windows allows authenticated local users to access sensitive information they shouldn't h...
Aug 8, 2023This vulnerability in Yubico's ykneo-openpgp smart card applet allows attackers to bypass PIN verification and generate signatures without proper auth...
Mar 30, 2022This vulnerability allows attackers to impersonate high-privilege users in Hitachi ID Bravura Security Fabric by injecting malicious data into SAML re...
Jun 9, 2021The evervault-go SDK's attestation verification logic had a vulnerability where incomplete enclave attestation documents could pass validation, potent...
Nov 12, 2025This vulnerability in Mendix SAML modules allows unauthenticated remote attackers to bypass signature validation and binding checks, potentially enabl...
Aug 14, 2025This vulnerability allows authenticated users on Windows systems to escalate privileges by leveraging Zoom client's elevated system permissions to spa...
Jun 13, 2023CVE-2021-22573 is a critical authentication bypass vulnerability in Google's OAuth Java client library where IDToken signature verification is missing...
May 3, 2022This vulnerability in Supermicro BMC firmware allows attackers to bypass validation checks and install malicious firmware images on affected systems. ...
Jan 16, 2026This vulnerability in the notation CLI tool allows attackers who have compromised a container registry to trick users into verifying the wrong artifac...
Jun 6, 2023This vulnerability in Hono's JWT middleware allows attackers to forge authentication tokens through algorithm confusion. Applications using Hono's JWT...
Jan 13, 2026This vulnerability in Hono's JWT verification middleware allows algorithm confusion attacks, enabling attackers to forge JWT tokens that could be acce...
Jan 13, 2026CVE-2024-7344 is a vulnerability in Howyar UEFI Application 'Reloader' that allows execution of unsigned software from a hardcoded path, bypassing Sec...
Jan 14, 2025A permission control vulnerability in Huawei's hidebug module allows unauthorized access to sensitive information. This affects Huawei devices and sys...
Nov 5, 2024This vulnerability allows attackers to replace binaries in Zscaler Client Connector on Linux due to improper cryptographic signature verification. It ...
Oct 23, 2023This vulnerability allows attackers to bypass the secure boot process on Texas Instruments OMAP L138 secure variant chips by reusing valid signed modu...
Oct 19, 2023A DLL sideloading vulnerability in McAfee Agent for Windows allows local users to execute arbitrary code with SYSTEM privileges by placing an unsigned...
Sep 22, 2021This vulnerability in Keycloak allows attackers to modify invitation token payloads to self-register into unauthorized organizations. Attackers can ex...
Feb 9, 2026This vulnerability in Nebula overlay networking tool allows attackers to bypass certificate blocklist entries when using P256 certificates (non-defaul...
Feb 6, 2026AWS CDK's IAM OIDC custom resource provider has a TLS certificate validation vulnerability where it accepts unauthorized connections. This allows pote...
Jan 17, 2025This vulnerability in D-Link COVR mesh Wi-Fi systems truncates WPA-PSK passwords, allowing attackers to bypass authentication and gain unauthorized ne...
Apr 3, 2024CVE-2021-3051 is an improper cryptographic signature verification vulnerability in Cortex XSOAR's SAML authentication that allows unauthenticated atta...
Sep 8, 2021This vulnerability allows network-adjacent attackers to bypass authentication and execute arbitrary code with root privileges on CarlinKit CPC200-CCPA...
Apr 23, 2025CVE-2025-13662 is a critical vulnerability in Ivanti Endpoint Manager's patch management component that allows remote unauthenticated attackers to exe...
Dec 9, 2025GoSign Desktop versions 2.4.0 and earlier have an insecure update mechanism that allows attackers to execute arbitrary code. The vulnerability occurs ...
Nov 18, 2025This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti Endpoint Manager (EPM) systems by exploiting improper s...
Jan 14, 2025Dell NetWorker Management Console versions 19.11 contain an improper cryptographic signature verification vulnerability. An unauthenticated attacker w...
Dec 3, 2024This vulnerability allows attackers to disable anti-tampering protection in Zscaler Client Connector without proper signature validation. This affects...
Aug 6, 2024This vulnerability in Parallels Desktop Updater allows local attackers to escalate privileges from low-privileged code execution to root-level access ...
May 3, 2024This vulnerability allows attackers to manipulate files on Unix systems running Snow Software Inventory Agent by exploiting improper cryptographic sig...
Feb 8, 2024The BIG-IP Edge Client Installer on macOS has a privilege escalation vulnerability during installation due to an incomplete fix for CVE-2023-38418. Th...
Oct 10, 2023The BIG-IP Edge Client Installer on macOS has improper privilege elevation during installation, allowing local attackers to potentially gain elevated ...
Aug 2, 2023CVE-2022-4418 is a local privilege escalation vulnerability in Acronis Cyber Protect Home Office for Windows that allows attackers to load unsigned li...
May 18, 2023This vulnerability allows a local malicious user to bypass cryptographic signature verification in Dell update utilities, potentially leading to execu...
Feb 1, 2023CVE-2021-20319 is an improper signature verification vulnerability in coreos-installer that allows specially crafted gzip installation images to bypas...
Mar 4, 2022This vulnerability allows local attackers to escalate privileges on macOS systems by exploiting unrestricted loading of unsigned libraries in Acronis ...
Feb 4, 2022CVE-2020-16156 is a signature verification bypass vulnerability in CPAN (Comprehensive Perl Archive Network) version 2.28. Attackers can craft malicio...
Dec 13, 2021CVE-2020-16154 is a signature verification bypass vulnerability in App::cpanminus (cpanm) for Perl. It allows attackers to install malicious CPAN modu...
Dec 13, 2021This vulnerability allows a local authenticated malicious user to execute arbitrary code on systems running vulnerable versions of Dell Command | Upda...
Aug 9, 2021This vulnerability in the Linux kernel allows loading of unsigned kernel modules even when module signature enforcement is requested via the module.si...
Jul 7, 2021This vulnerability allows attackers to bypass SAML signature validation in Keycloak by crafting malicious SAML responses. Attackers could impersonate ...
Sep 19, 2024This vulnerability allows attackers to bypass cryptographic signature verification in B. Braun medical device firmware updates, enabling them to insta...
Apr 14, 2022About CWE-347 (CWE-347)
Our database tracks 181 CVEs classified as CWE-347, with 54 rated critical and 91 rated high severity. The average CVSS score for CWE-347 vulnerabilities is 7.9.
External reference: View CWE-347 on MITRE CWE →
Monitor CWE-347 Vulnerabilities
Get alerted when new CWE-347 CVEs affect your infrastructure.
Start Monitoring Free