CWE-347: CWE-347
Yearly Trend
Top Affected Vendors
All CWE-347 CVEs (182)
This vulnerability in Foxit PDF software allows attackers to create malicious PDFs that use JavaScript to modify annotation content and clear modifica...
Dec 11, 2025This vulnerability allows local attackers to execute arbitrary code on macOS systems by exploiting the Zscaler Updater's failure to validate digital s...
Aug 6, 2024This vulnerability in TIA Administrator allows attackers to bypass code signing certificate validation during installations, potentially enabling arbi...
Jul 8, 2025This vulnerability allows authenticated local attackers with root-system privileges to bypass Cisco IOS XR Software image signature verification and l...
Sep 10, 2025This vulnerability in go-tuf allows a compromised or misconfigured TUF repository to set signature verification thresholds to zero, effectively disabl...
Jan 22, 2026This GnuPG vulnerability allows attackers to append unauthorized content to signed messages while still passing signature verification. The attack exp...
Dec 27, 2025This vulnerability in ABB systems allows attackers to send specially crafted firmware or configuration files to system nodes, potentially causing deni...
Oct 25, 2024The OpenSSL 'dgst' command-line tool silently truncates files larger than 16MB when using one-shot signing algorithms (Ed25519, Ed448, ML-DSA variants...
Jan 27, 2026A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...
Dec 12, 2025A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...
Nov 4, 2025This CVE describes a code-signing downgrade vulnerability in macOS that could allow malicious applications to bypass security restrictions and access ...
Jul 30, 2025A cryptographic signature verification flaw in LibreOffice allows attackers to spoof PDF signatures by making invalid signatures appear valid. This af...
Apr 27, 2025This vulnerability in sigstore-java allows attackers to present a validly-signed but mismatched bundle that appears to be logged in a transparency log...
Nov 26, 2024CVE-2024-37886 is a signature verification bypass vulnerability in Nextcloud's user_oidc app that allows attackers to potentially forge OpenID Connect...
Jun 14, 2024This vulnerability in the ML-DSA Rust crate allows attackers to forge digital signatures by exploiting a validation flaw where duplicate hint indices ...
Jan 28, 2026Jervis versions before 2.2 fail to validate JWT algorithm headers, allowing attackers to forge tokens using weaker algorithms like 'none' or HMAC. Thi...
Jan 13, 2026Foxit PDF Editor and Reader versions before 2025.2.1 contain a signature spoofing vulnerability where attackers can embed triggers (like JavaScript) i...
Dec 11, 2025This vulnerability allows attackers to spoof digital certificates in Windows systems by exploiting improper cryptographic signature verification. Atta...
Aug 21, 2025This vulnerability in Deno runtime versions 1.46.0 through 2.1.6 fails to validate AES-GCM authentication tags, allowing tampered ciphertexts to go un...
Jun 3, 2025This vulnerability in mutt and neomutt email clients allows attackers to reuse signed but unencrypted email messages by manipulating the In-Reply-To h...
Nov 12, 2024This vulnerability in filestash v0.4 disables SSH host key verification, allowing man-in-the-middle attackers to intercept and potentially steal sensi...
Jul 31, 2024This vulnerability in litestream v0.3.13 disables SSH host key verification, allowing man-in-the-middle attackers to intercept and potentially modify ...
Jul 31, 2024This vulnerability in the FreeFrom nostr client allows attackers to inject malicious event data with invalid cryptographic signatures that the app can...
Jun 17, 2024This vulnerability in NetApp StorageGRID allows attackers to potentially intercept and decrypt SSH communications through man-in-the-middle attacks. I...
Jun 14, 2024This Windows vulnerability allows attackers to bypass digital signature validation, enabling them to load malicious files that appear legitimate. It a...
Oct 16, 2020This vulnerability allows attackers to bypass Secure Boot protection in IGEL OS by exploiting improper cryptographic signature verification in the ige...
Jun 5, 2025This vulnerability in Poppler's PDF processing library allows attackers to forge digital signatures on PDF documents by bypassing signature verificati...
Apr 18, 2025A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...
Dec 12, 2025Acrobat Reader has an improper cryptographic signature verification vulnerability that allows attackers to bypass security features and gain limited u...
Dec 9, 2025This CVE describes an Improper Verification of Cryptographic Signature vulnerability in Adobe Acrobat Reader that allows attackers to bypass cryptogra...
Dec 9, 2025This vulnerability allows attackers to bypass authentication in Drupal Commerce Paybox payment processing module by exploiting improper cryptographic ...
Jan 28, 2026This vulnerability allows attackers to bypass cryptographic signature verification in the quick-media library's SVG processing module. Attackers could...
Jan 27, 2026About CWE-347 (CWE-347)
Our database tracks 182 CVEs classified as CWE-347, with 54 rated critical and 92 rated high severity. The average CVSS score for CWE-347 vulnerabilities is 7.9.
External reference: View CWE-347 on MITRE CWE →
Monitor CWE-347 Vulnerabilities
Get alerted when new CWE-347 CVEs affect your infrastructure.
Start Monitoring Free