IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.
References
Link | Resource |
---|---|
http://www.ibm.com/support/docview.wss?uid=swg21995903 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/95195 | Third Party Advisory VDB Entry |
http://www.ibm.com/support/docview.wss?uid=swg21995903 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/95195 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ibm.com/support/docview.wss?uid=swg21995903 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/95195 - Third Party Advisory, VDB Entry |
Information
Published : 2017-02-01 20:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3034
Mitre link : CVE-2016-3034
CVE.ORG link : CVE-2016-3034
JSON object : View
Products Affected
ibm
- security_appscan_source
CWE
CWE-326
Inadequate Encryption Strength