Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-08-12 | CVE-2020-36363 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Amazon Cloudfront 1.22019 Amazon AWS CloudFront TLSv1.2_2019 allows TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, which some entities consider to be weak ciphers. | 9.8 |
2021-08-11 | CVE-2019-25052 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Linaro Op-Tee In Linaro OP-TEE before 3.7.0, by using inconsistent or malformed data, it is possible to call update and final cryptographic functions directly, causing a crash that could leak sensitive information. | 9.1 |
2021-08-06 | CVE-2021-37546 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2021.1, an insecure key generation mechanism for encrypted properties was used. | 5.3 |
2021-07-30 | CVE-2021-37587 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in JHU Charm 0.43 In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data. | 6.5 |
2021-07-30 | CVE-2021-37588 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in JHU Charm 0.43 In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data. | 5.9 |
2021-07-26 | CVE-2021-20337 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Qradar Security Information and Event Manager IBM QRadar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-07-15 | CVE-2021-20497 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Verify Access 10.0.0 IBM Security Verify Access Docker 10.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-07-15 | CVE-2021-34687 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Idrive Remotepc iDrive RemotePC before 7.6.48 on Windows allows information disclosure. | 5.3 |
2021-07-12 | CVE-2021-29794 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Tivoli Netcool/Impact 7.1.0.20/7.1.0.21 IBM Tivoli Netcool/Impact 7.1.0.20 and 7.1.0.21 uses an insecure SSH server configuration which enables weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-07-07 | CVE-2021-20379 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Guardium Data Encryption 3.0.0.3/4.0.0.4 IBM Guardium Data Encryption (GDE) 3.0.0.3 and 4.0.0.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |