CVE-2016-3034

IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.
References
Link Resource
http://www.ibm.com/support/docview.wss?uid=swg21995903 Patch Vendor Advisory
http://www.securityfocus.com/bid/95195 Third Party Advisory VDB Entry
http://www.ibm.com/support/docview.wss?uid=swg21995903 Patch Vendor Advisory
http://www.securityfocus.com/bid/95195 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:security_appscan_source:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan_source:9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan_source:9.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:49

Type Values Removed Values Added
References () http://www.ibm.com/support/docview.wss?uid=swg21995903 - Patch, Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=swg21995903 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/95195 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95195 - Third Party Advisory, VDB Entry

Information

Published : 2017-02-01 20:59

Updated : 2024-11-21 02:49


NVD link : CVE-2016-3034

Mitre link : CVE-2016-3034

CVE.ORG link : CVE-2016-3034


JSON object : View

Products Affected

ibm

  • security_appscan_source
CWE
CWE-326

Inadequate Encryption Strength