Vulnerabilities > Inadequate Encryption Strength
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-20 | CVE-2016-4685 | Inadequate Encryption Strength vulnerability in Apple Iphone OS An issue was discovered in certain Apple products. | 5.9 |
2017-02-16 | CVE-2016-5919 | Inadequate Encryption Strength vulnerability in IBM products IBM Security Access Manager for Web 7.0.0, 8.0.0, and 9.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2017-02-01 | CVE-2016-3034 | Inadequate Encryption Strength vulnerability in IBM Security Appscan Source 9.0.1/9.0.2/9.0.3 IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily. | 4.4 |
2017-01-30 | CVE-2016-7798 | Inadequate Encryption Strength vulnerability in multiple products The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | 7.5 |
2017-01-23 | CVE-2016-10104 | Inadequate Encryption Strength vulnerability in Hiteksoftware Automize Information Disclosure can occur in sshProfiles.jsd in Hitek Software's Automize because of the Read attribute being set for Users. | 5.9 |
2017-01-23 | CVE-2016-10103 | Inadequate Encryption Strength vulnerability in Hiteksoftware Automize Information Disclosure can occur in encryptionProfiles.jsd in Hitek Software's Automize because of the Read attribute being set for Users. | 8.1 |
2017-01-23 | CVE-2016-10102 | Inadequate Encryption Strength vulnerability in Hiteksoftware Automize hitek.jar in Hitek Software's Automize uses weak encryption when encrypting SSH/SFTP and Encryption profile passwords. | 8.1 |
2017-01-23 | CVE-2016-10101 | Inadequate Encryption Strength vulnerability in Hiteksoftware Automize Information Disclosure can occur in Hitek Software's Automize 10.x and 11.x passManager.jsd. | 8.1 |
2016-10-14 | CVE-2005-4900 | Inadequate Encryption Strength vulnerability in Google Chrome SHA-1 is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of SHA-1 in TLS 1.2. | 5.9 |
2016-10-03 | CVE-2015-8086 | Inadequate Encryption Strength vulnerability in Huawei products Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. | 4.9 |