Vulnerabilities > Inadequate Encryption Strength
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-08 | CVE-2018-21080 | Inadequate Encryption Strength vulnerability in Google Android An issue was discovered on Samsung mobile devices with N(7.x) software. | 4.6 |
2020-04-07 | CVE-2016-11043 | Inadequate Encryption Strength vulnerability in Google Android 6.0 An issue was discovered on Samsung mobile devices with M(6.0) software. | 7.5 |
2020-04-02 | CVE-2019-19097 | Inadequate Encryption Strength vulnerability in Hitachienergy Esoms ABB eSOMS versions 4.0 to 6.0.3 accept connections using medium strength ciphers. | 7.5 |
2020-04-01 | CVE-2020-10866 | Inadequate Encryption Strength vulnerability in Avast Antivirus An issue was discovered in Avast Antivirus before 20. | 7.5 |
2020-03-20 | CVE-2019-14855 | Inadequate Encryption Strength vulnerability in multiple products A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. | 7.5 |
2020-03-18 | CVE-2019-12121 | Inadequate Encryption Strength vulnerability in Onap Open Network Automation Platform An issue was detected in ONAP Portal through Dublin. | 7.5 |
2020-03-09 | CVE-2020-10244 | Inadequate Encryption Strength vulnerability in Jpaseto Project Jpaseto 0.1.0/0.2.0 JPaseto before 0.3.0 generates weak hashes when using v2.local tokens. | 7.5 |
2020-03-04 | CVE-2020-9476 | Inadequate Encryption Strength vulnerability in Commscope Arris Tg1692A Firmware 9.1.103De2 ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding. | 7.5 |
2020-03-02 | CVE-2019-18863 | Inadequate Encryption Strength vulnerability in Mitel products A key length vulnerability in the implementation of the SRTP 128-bit key on Mitel 6800 and 6900 SIP series phones, versions 5.1.0.2051 SP2 and earlier, could allow an attacker to launch a man-in-the-middle attack when SRTP is used in a call. | 5.9 |
2020-02-28 | CVE-2015-5361 | Inadequate Encryption Strength vulnerability in Juniper Junos Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. | 6.5 |