Vulnerabilities (CVE)

Filtered by CWE-310
Total 2447 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-7923 1 Westermo 1 Weos 2024-02-28 9.3 HIGH 9.0 CRITICAL
Westermo WeOS before 4.19.0 uses the same SSL private key across different customers' installations, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a key.
CVE-2015-5012 1 Ibm 3 Security Access Manager 9.0 Firmware, Security Access Manager For Web 7.0 Firmware, Security Access Manager For Web 8.0 Firmware 2024-02-28 5.0 MEDIUM 7.5 HIGH
The SSH implementation on IBM Security Access Manager for Web appliances 7.0 before 7.0.0 FP19, 8.0 before 8.0.1.3 IF3, and 9.0 before 9.0.0.0 IF1 does not properly restrict the set of MAC algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2016-2113 2 Canonical, Samba 2 Ubuntu Linux, Samba 2024-02-28 5.8 MEDIUM 7.4 HIGH
Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
CVE-2016-3071 2 Fedoraproject, Libreswan 2 Fedora, Libreswan 2024-02-28 5.0 MEDIUM 7.5 HIGH
Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.
CVE-2016-4754 1 Apple 1 Os X Server 2024-02-28 5.0 MEDIUM 7.5 HIGH
ServerDocs Server in Apple OS X Server before 5.2 supports the RC4 cipher, which might allow remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2016-4495 1 Kmc Controls 2 Bac-5051e, Bac-5051e Firmware 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
KMC Controls BAC-5051E devices with firmware before E0.2.0.2 allow remote attackers to bypass intended access restrictions and read a configuration file via unspecified vectors.
CVE-2014-9742 1 Botan Project 1 Botan 2024-02-28 5.0 MEDIUM 7.5 HIGH
The Miller-Rabin primality check in Botan before 1.10.8 and 1.11.x before 1.11.9 improperly uses a single random base, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a DH group.