Vulnerabilities > Inadequate Encryption Strength
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-06 | CVE-2022-3273 | Inadequate Encryption Strength vulnerability in Ikus-Soft Rdiffweb Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | 9.8 |
2022-09-19 | CVE-2022-29835 | Inadequate Encryption Strength vulnerability in Westerndigital WD Discovery 4.0.251.0 WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. | 5.3 |
2022-09-06 | CVE-2022-35931 | Inadequate Encryption Strength vulnerability in Nextcloud Password Policy Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. | 2.7 |
2022-08-29 | CVE-2022-36555 | Inadequate Encryption Strength vulnerability in Hytec Hwl-2511-Ss Firmware 1.05 Hytec Inter HWL-2511-SS v1.05 and below implements a SHA512crypt hash for the root account which can be easily cracked via a brute-force attack. | 9.8 |
2022-08-18 | CVE-2022-21139 | Inadequate Encryption Strength vulnerability in Intel products Inadequate encryption strength for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 8.8 |
2022-08-02 | CVE-2022-30285 | Inadequate Encryption Strength vulnerability in Quest Kace Systems Management Appliance In Quest KACE Systems Management Appliance (SMA) through 12.0, a hash collision is possible during authentication. | 9.8 |
2022-07-14 | CVE-2022-22453 | Inadequate Encryption Strength vulnerability in IBM Security Verify Governance 10.0 IBM Security Verify Identity Manager 10.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-07-08 | CVE-2022-22464 | Inadequate Encryption Strength vulnerability in IBM Security Verify Access IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-06-02 | CVE-2022-31459 | Inadequate Encryption Strength vulnerability in Owllabs Meeting OWL PRO Firmware 5.2.0.15 Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth. | 6.5 |
2022-05-19 | CVE-2020-16235 | Inadequate Encryption Strength vulnerability in Emerson Openenterprise Scada Server Inadequate encryption may allow the credentials used by Emerson OpenEnterprise, up through version 3.3.5, to access field devices and external systems to be obtained. | 6.5 |