Vulnerabilities > Inadequate Encryption Strength
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-09-26 | CVE-2018-1785 | Inadequate Encryption Strength vulnerability in IBM products IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. | 7.5 |
2018-09-26 | CVE-2018-1545 | Inadequate Encryption Strength vulnerability in IBM products IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2018-09-18 | CVE-2018-17177 | Inadequate Encryption Strength vulnerability in Neatorobotics products An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. | 2.4 |
2018-08-14 | CVE-2018-0131 | Inadequate Encryption Strength vulnerability in Cisco IOS and IOS XE A vulnerability in the implementation of RSA-encrypted nonces in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session. | 5.9 |
2018-08-13 | CVE-2018-15124 | Inadequate Encryption Strength vulnerability in Zipato Zipabox Firmware 118 Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device. | 9.8 |
2018-08-06 | CVE-2017-1366 | Inadequate Encryption Strength vulnerability in IBM Security Identity Governance and Intelligence IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2018-06-27 | CVE-2017-16726 | Inadequate Encryption Strength vulnerability in Beckhoff Twincat Beckhoff TwinCAT supports communication over ADS. | 9.1 |
2018-06-18 | CVE-2018-9028 | Inadequate Encryption Strength vulnerability in Broadcom Privileged Access Manager Weak cryptography used for passwords in CA Privileged Access Manager 2.x reduces the complexity for password cracking. | 7.5 |
2018-06-11 | CVE-2018-5184 | Inadequate Encryption Strength vulnerability in multiple products Using remote content in encrypted messages can lead to the disclosure of plaintext. | 7.5 |
2018-05-23 | CVE-2017-2598 | Inadequate Encryption Strength vulnerability in Jenkins Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304). | 4.3 |