Vulnerabilities > Missing Encryption of Sensitive Data

DATE CVE VULNERABILITY TITLE RISK
2017-04-25 CVE-2017-8221 Missing Encryption of Sensitive Data vulnerability in Wificam Wireless IP Camera (P2P) Firmware
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
network
low complexity
wificam CWE-311
7.5
2017-04-24 CVE-2017-5042 Missing Encryption of Sensitive Data vulnerability in multiple products
Cast in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android sent cookies to sites discovered via SSDP, which allowed an attacker on the local network segment to initiate connections to arbitrary URLs and observe any plaintext cookies sent.
low complexity
google redhat debian CWE-311
5.7
2017-03-05 CVE-2017-6445 Missing Encryption of Sensitive Data vulnerability in Openelec 6.0.3/7.0.1
The auto-update feature of Open Embedded Linux Entertainment Center (OpenELEC) 6.0.3, 7.0.1, and 8.0.4 uses neither encrypted connections nor signed updates.
network
high complexity
openelec CWE-311
8.1
2017-02-27 CVE-2017-6297 Missing Encryption of Sensitive Data vulnerability in Mikrotik Routeros 6.37.4/6.83.3
The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret.
network
high complexity
mikrotik CWE-311
5.9
2007-09-18 CVE-2007-4961 Missing Encryption of Sensitive Data vulnerability in Lindenlab Second Life
The login_to_simulator method in Linden Lab Second Life, as used by the secondlife:// protocol handler and possibly other Second Life login mechanisms, sends an MD5 hash in cleartext in the passwd field, which allows remote attackers to login to an account by sniffing the network and then sending this hash to a Second Life authentication server.
network
low complexity
lindenlab CWE-311
7.5