Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-03-18 | CVE-2019-14852 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Redhat 3Scale API Management 2.0 A flaw was found in 3scale’s APIcast gateway that enabled the TLS 1.0 protocol. | 7.5 |
2021-03-12 | CVE-2020-4831 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Datapower Gateway 10.0.0.0/10.0.0.1/10.0.1.0 IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2021-03-03 | CVE-2021-20441 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Verify Bridge IBM Security Verify Bridge uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.9 |
2021-02-24 | CVE-2020-12702 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Coolkit Ewelink Weak encryption in the Quick Pairing mode in the eWeLink mobile application (Android application V4.9.2 and earlier, iOS application V4.9.1 and earlier) allows physically proximate attackers to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during the pairing process. | 4.6 |
2021-02-16 | CVE-2021-23839 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products OpenSSL 1.0.2 supports SSLv2. | 3.7 |
2021-02-11 | CVE-2020-25493 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Oclean 2.1.2 Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. | 7.5 |
2021-02-04 | CVE-2020-14246 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltechsw Onetest Performance 10.0.0/10.1.0/9.5.0 HCL OneTest Performance V9.5, V10.0, V10.1 uses basic authentication which is relatively weak. | 7.5 |
2021-02-03 | CVE-2021-25763 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Jetbrains Ktor In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. | 5.3 |
2021-01-29 | CVE-2020-29536 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in RSA Archer Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. | 4.3 |
2021-01-26 | CVE-2020-36201 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Xerox products An issue was discovered in certain Xerox WorkCentre products. | 7.5 |