Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2021-12-08 CVE-2021-43808 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Laravel Framework
Laravel is a web application framework.
network
low complexity
laravel CWE-327
6.1
2021-12-06 CVE-2021-22170 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gitlab
Assuming a database breach, nonce reuse issues in GitLab 11.6+ allows an attacker to decrypt some of the database's encrypted content
network
low complexity
gitlab CWE-327
7.5
2021-11-23 CVE-2021-22356 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei products
There is a weak secure algorithm vulnerability in Huawei products.
network
high complexity
huawei CWE-327
5.9
2021-11-19 CVE-2021-41278 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Edgexfoundry products
Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform.
network
low complexity
edgexfoundry CWE-327
5.7
2021-11-15 CVE-2021-41263 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Discourse Rails Multisite
rails_multisite provides multi-db support for Rails applications.
network
low complexity
discourse CWE-327
8.8
2021-10-25 CVE-2020-14264 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech Traveler Companion
"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"
low complexity
hcltech CWE-327
3.9
2021-10-19 CVE-2021-31352 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Juniper Session and Resource Control
An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information.
network
low complexity
juniper CWE-327
5.3
2021-10-01 CVE-2021-36298 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Isilon Insightiq Firmware
Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component.
network
low complexity
dell CWE-327
critical
9.8
2021-09-30 CVE-2021-29894 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud PAK for Security 1.7.0.0/1.7.1.0/1.7.2.0
IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2021-09-27 CVE-2021-41096 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Rucky Project Rucky
Rucky is a USB HID Rubber Ducky Launch Pad for Android.
network
low complexity
rucky-project CWE-327
7.5