Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
encryption vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-20341
WINMAGIC SecureDoc Disk Encryption software prior to 8.3 has an Unquoted Service Path vulnerability, which could allow an malicious user to execute arbitrary code on a target system. If the executable is enclosed in quote tags "" then the system will know where to find ...
Winmagic Securedoc Disk Encryption
4.3
CVSSv3
CVE-2018-15773
Dell Encryption (formerly Dell Data Protection | Encryption) v10.1.0 and previous versions contain an information disclosure vulnerability. A malicious user with physical access to the machine could potentially exploit this vulnerability to access the unencrypted RegBack folder t...
Dell Data Protection | Encryption
NA
CVE-2013-4674
Cross-site scripting (XSS) vulnerability in the Web Email Protection component in Symantec Encryption Management Server (formerly Symantec PGP Universal Server) prior to 3.3.0 MP2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted encrypted e-m...
Symantec Encryption Management Server 3.3.0
Symantec Encryption Management Server
Symantec Pgp Universal Server 3.2.1
Symantec Pgp Universal Server 3.2.0
6.8
CVSSv3
CVE-2023-28005
A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows? Secure Boot process in an attempt to execute other attacks to obtain access to the ...
Trendmicro Trend Micro Endpoint Encryption
6.5
CVSSv3
CVE-2023-35173
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryptio...
Nextcloud End-to-end Encryption
7.5
CVSSv3
CVE-2021-20415
IBM Guardium Data Encryption (GDE) 4.0.0.4 uses an inadequate account lockout setting that could allow a remote malicious user to brute force account credentials. IBM X-Force ID: 196217.
Ibm Guardium Data Encryption 4.0.0.4
4.3
CVSSv3
CVE-2021-20417
IBM Guardium Data Encryption (GDE) 4.0.0.4 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196219
Ibm Guardium Data Encryption 4.0.0.4
5.3
CVSSv3
CVE-2021-39021
IBM Guardium Data Encryption (GDE) 5.0.0.2 behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which could facilitate username enumeration. IBM X-Force ID: 213856.
Ibm Guardium Data Encryption 5.0.0.2
4.3
CVSSv3
CVE-2021-20413
IBM Guardium Data Encryption (GDE) 4.0.0.4 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196212.
Ibm Guardium Data Encryption 4.0.0.4
9.8
CVSSv3
CVE-2018-6220
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »