Show filters
160 Total Results
Displaying 141-150 of 160
Sort by:
Attacker Value
Unknown

CVE-2019-18863

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
A key length vulnerability in the implementation of the SRTP 128-bit key on Mitel 6800 and 6900 SIP series phones, versions 5.1.0.2051 SP2 and earlier, could allow an attacker to launch a man-in-the-middle attack when SRTP is used in a call. A successful exploit may allow the attacker to intercept sensitive information.
Attacker Value
Unknown

CVE-2019-4557

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
IBM Qradar Advisor 1.1 through 2.5 with Watson uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 166206.
Attacker Value
Unknown

CVE-2013-7287

Disclosure Date: February 13, 2020 (last updated February 21, 2025)
MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.
Attacker Value
Unknown

CVE-2013-7286

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm
Attacker Value
Unknown

CVE-2019-13163

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.
Attacker Value
Unknown

CVE-2011-3629

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
Joomla! core 1.7.1 allows information disclosure due to weak encryption
Attacker Value
Unknown

Session key exposure through session list in Django User Sessions

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.
Attacker Value
Unknown

CVE-2020-6966

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilize a weak encryption scheme for remote desktop control, which may allow an attacker to obtain remote code execution of devices on the network.
Attacker Value
Unknown

CVE-2015-5361

Disclosure Date: October 14, 2015 (last updated February 21, 2025)
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide…
Attacker Value
Unknown

CVE-2005-2281

Disclosure Date: July 18, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 uses a weak encryption scheme for passwords, which makes it easier for attackers to crack passwords.