Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-02-04 | CVE-2020-14246 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltechsw Onetest Performance 10.0.0/10.1.0/9.5.0 HCL OneTest Performance V9.5, V10.0, V10.1 uses basic authentication which is relatively weak. | 7.5 |
2021-02-03 | CVE-2021-25763 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Jetbrains Ktor In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. | 5.3 |
2021-01-29 | CVE-2020-29536 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in RSA Archer Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. | 4.3 |
2021-01-26 | CVE-2020-36201 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Xerox products An issue was discovered in certain Xerox WorkCentre products. | 7.5 |
2021-01-26 | CVE-2020-23162 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Pyres Termod4 Firmware Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read a session-file and obtain plain-text user credentials. | 7.5 |
2021-01-21 | CVE-2020-4968 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Identity Governance and Intelligence 5.2.6 IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 6.5 |
2021-01-20 | CVE-2020-20949 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). | 5.9 |
2021-01-19 | CVE-2020-20950 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. | 5.9 |
2021-01-13 | CVE-2013-1053 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Canonical Remote-Login-Service 1.0.00Ubuntu3 In crypt.c of remote-login-service, the cryptographic algorithm used to cache usernames and passwords is insecure. | 5.5 |
2021-01-13 | CVE-2020-4596 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium Insights 2.0.2 IBM Security Guardium Insights 2.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |