Show filters
151 Total Results
Displaying 131-140 of 151
Sort by:
Attacker Value
Unknown
CVE-2020-9476
Disclosure Date: March 04, 2020 (last updated February 21, 2025)
ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding.
0
Attacker Value
Unknown
CVE-2019-18863
Disclosure Date: March 02, 2020 (last updated February 21, 2025)
A key length vulnerability in the implementation of the SRTP 128-bit key on Mitel 6800 and 6900 SIP series phones, versions 5.1.0.2051 SP2 and earlier, could allow an attacker to launch a man-in-the-middle attack when SRTP is used in a call. A successful exploit may allow the attacker to intercept sensitive information.
0
Attacker Value
Unknown
CVE-2019-4557
Disclosure Date: February 24, 2020 (last updated February 21, 2025)
IBM Qradar Advisor 1.1 through 2.5 with Watson uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 166206.
0
Attacker Value
Unknown
CVE-2013-7287
Disclosure Date: February 13, 2020 (last updated February 21, 2025)
MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.
0
Attacker Value
Unknown
CVE-2013-7286
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm
0
Attacker Value
Unknown
CVE-2019-13163
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.
0
Attacker Value
Unknown
CVE-2011-3629
Disclosure Date: February 04, 2020 (last updated February 21, 2025)
Joomla! core 1.7.1 allows information disclosure due to weak encryption
0
Attacker Value
Unknown
Session key exposure through session list in Django User Sessions
Disclosure Date: January 24, 2020 (last updated February 21, 2025)
In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.
0
Attacker Value
Unknown
CVE-2020-6966
Disclosure Date: January 24, 2020 (last updated February 21, 2025)
In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilize a weak encryption scheme for remote desktop control, which may allow an attacker to obtain remote code execution of devices on the network.
0
Attacker Value
Unknown
CVE-2015-5361
Disclosure Date: October 14, 2015 (last updated February 21, 2025)
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide…
0