Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
encryption vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2018-10355
An authentication weakness vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to recover user passwords on vulnerable installations due to a flaw in the DBCrypto class. An attacker must first obtain access to the user database on the target sy...
Trendmicro Email Encryption Gateway
9
CVSSv2
CVE-2018-10351
A vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a remote malicious user to execute arbitrary SQL statements on vulnerable installations due to a flaw in the formRegistration2 class. Authentication is required to exploit this vulnerability.
Trendmicro Email Encryption Gateway
4.3
CVSSv2
CVE-2013-4674
Cross-site scripting (XSS) vulnerability in the Web Email Protection component in Symantec Encryption Management Server (formerly Symantec PGP Universal Server) prior to 3.3.0 MP2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted encrypted e-m...
Symantec Pgp Universal Server 3.2.0
Symantec Pgp Universal Server 3.2.1
Symantec Encryption Management Server 3.3.0
Symantec Encryption Management Server
4
CVSSv2
CVE-2021-22906
Nextcloud End-to-End Encryption prior to 1.5.3, 1.6.3 and 1.7.1 suffers from a denial of service vulnerability due to permitting any authenticated users to lock files of other users.
Nextcloud End-to-end Encryption
6.4
CVSSv2
CVE-2018-6219
An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to eavesdrop and tamper with certain types of update data.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
9.3
CVSSv2
CVE-2018-6221
An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle malicious user to tamper with an update file and inject their own.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
7.2
CVSSv2
CVE-2018-6222
Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
5
CVSSv2
CVE-2018-6223
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to manipulate the registration process of the product to reset configuration parameters.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
6.8
CVSSv2
CVE-2018-6224
A lack of cross-site request forgery (CSRF) protection vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to submit authenticated requests to a user browsing an attacker-controlled domain.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
4
CVSSv2
CVE-2018-6225
An XML external entity injection (XXE) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an authenticated user to expose a normally protected configuration script.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »