Show filters
120 Total Results
Displaying 61-70 of 120
Sort by:
Attacker Value
Unknown

CVE-2021-25761

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
Attacker Value
Unknown

CVE-2020-25685

Disclosure Date: January 20, 2021 (last updated February 22, 2025)
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
Attacker Value
Unknown

CVE-2021-3131

Disclosure Date: January 13, 2021 (last updated February 22, 2025)
The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.
Attacker Value
Unknown

CVE-2019-4160

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158577.
Attacker Value
Unknown

CVE-2017-20001

Disclosure Date: January 01, 2021 (last updated February 22, 2025)
The AES encryption project 7.x and 8.x for Drupal does not sufficiently prevent attackers from decrypting data, aka SA-CONTRIB-2017-027. NOTE: This project is not covered by Drupal's security advisory policy.
Attacker Value
Unknown

CVE-2020-26263

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. This is patched in versions 0.7.6 and 0.8.0-alpha39. Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.
Attacker Value
Unknown

CVE-2020-7565

Disclosure Date: November 19, 2020 (last updated February 22, 2025)
A CWE-326: Inadequate Encryption Strength vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to break the encryption key when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller.
Attacker Value
Unknown

CVE-2020-17494

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Untangle Firewall NG before 16.0 uses MD5 for passwords.
Attacker Value
Unknown

CVE-2020-8761

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access.
Attacker Value
Unknown

CVE-2020-9128

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak.