Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2021-02-15 CVE-2021-27211 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Steghide Project Steghide 0.5.1
steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
network
low complexity
steghide-project CWE-327
5.0
2021-02-12 CVE-2021-20406 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in IBM Security Verify Information Queue 1.0.6/1.0.7
IBM Security Verify Information Queue 1.0.6 and 1.0.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
4.0
2021-02-11 CVE-2020-25493 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Oclean 2.1.2
Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic.
network
low complexity
oclean CWE-327
5.0
2021-02-05 CVE-2020-10554 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Psyprax
An issue was discovered in Psyprax beforee 3.2.2.
network
low complexity
psyprax CWE-327
5.0
2021-02-03 CVE-2021-25763 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Jetbrains Ktor
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default.
network
low complexity
jetbrains CWE-327
5.0
2021-02-03 CVE-2021-25761 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Jetbrains Ktor
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
network
low complexity
jetbrains CWE-327
5.0
2021-02-02 CVE-2020-28498 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Elliptic Project Elliptic
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js.
4.3
2021-01-29 CVE-2020-29536 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in RSA Archer
Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability.
network
low complexity
rsa CWE-327
4.0
2021-01-21 CVE-2020-4968 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in IBM Security Identity Governance and Intelligence 5.2.6
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
low complexity
ibm CWE-327
3.3
2021-01-13 CVE-2013-1053 USE of A Broken OR Risky Cryptographic Algorithm vulnerability in Canonical Remote-Login-Service
In crypt.c of remote-login-service, the cryptographic algorithm used to cache usernames and passwords is insecure.
local
low complexity
canonical CWE-327
2.1