Vulnerabilities > Inadequate Encryption Strength
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-19 | CVE-2021-38464 | Inadequate Encryption Strength vulnerability in Inhandnetworks Ir615 Firmware 2.3.0.R4724/2.3.0.R4870 InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have inadequate encryption strength, which may allow an attacker to intercept the communication and steal sensitive information or hijack the session. | 7.4 |
2021-10-12 | CVE-2021-38862 | Inadequate Encryption Strength vulnerability in IBM Data Risk Manager 2.0.6 IBM Data Risk Manager (iDNA) 2.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-10-06 | CVE-2021-38925 | Inadequate Encryption Strength vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator Standard Edition 5.2.0. | 7.5 |
2021-10-04 | CVE-2021-23855 | Inadequate Encryption Strength vulnerability in Bosch products The user and password data base is exposed by an unprotected web server resource. | 7.5 |
2021-08-11 | CVE-2017-16632 | Inadequate Encryption Strength vulnerability in Sapphireims 40971 In SapphireIMS 4097_1, the password in the database is stored in Base64 format. | 7.5 |
2021-07-30 | CVE-2021-28093 | Inadequate Encryption Strength vulnerability in Open-Xchange Documents 7.10.5/7.8.3 OX Documents before 7.10.5-rev5 has Incorrect Access Control of converted images because hash collisions can occur, due to use of Adler32. | 6.5 |
2021-07-30 | CVE-2021-28094 | Inadequate Encryption Strength vulnerability in Open-Xchange Documents 7.10.5/7.8.3 OX Documents before 7.10.5-rev7 has Incorrect Access Control for converted documents because hash collisions can occur, due to use of CRC32. | 6.5 |
2021-07-30 | CVE-2021-28095 | Inadequate Encryption Strength vulnerability in Open-Xchange Documents 7.10.5/7.8.3 OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32. | 4.8 |
2021-07-13 | CVE-2021-20360 | Inadequate Encryption Strength vulnerability in IBM Cloud PAK for Applications 4.3 IBM Cloud Pak for Applications 4.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-07-13 | CVE-2021-20369 | Inadequate Encryption Strength vulnerability in IBM Cloud PAK for Applications IBM Cloud Pak for Applications 4.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.9 |