Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
encryption vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2021-20417
IBM Guardium Data Encryption (GDE) 4.0.0.4 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196219
Ibm Guardium Data Encryption 4.0.0.4
6.5
CVSSv3
CVE-2023-35173
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryptio...
Nextcloud End-to-end Encryption
5.3
CVSSv3
CVE-2018-1593
IBM Multi-Cloud Data Encryption (MDE) 2.1 could allow an unauthorized user to manipulate data due to missing file checksums. IBM X-Force ID: 143568.
Ibm Multi-cloud Data Encryption
4.3
CVSSv3
CVE-2021-20413
IBM Guardium Data Encryption (GDE) 4.0.0.4 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196212.
Ibm Guardium Data Encryption 4.0.0.4
4.9
CVSSv3
CVE-2021-20414
IBM Guardium Data Encryption (GDE) 3.0.0.2 could allow a user to bruce force sensitive information due to not properly limiting the number of interactions. IBM X-Force ID: 196216.
Ibm Guardium Data Encryption 3.0.0.2
6.5
CVSSv3
CVE-2018-6219
An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to eavesdrop and tamper with certain types of update data.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
9.8
CVSSv3
CVE-2018-6220
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
8.1
CVSSv3
CVE-2018-6221
An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle malicious user to tamper with an update file and inject their own.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
7.8
CVSSv3
CVE-2018-6222
Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
9.8
CVSSv3
CVE-2018-6223
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an malicious user to manipulate the registration process of the product to reset configuration parameters.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »