Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2020-03-24 CVE-2020-6987 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Moxa products
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.
network
low complexity
moxa CWE-327
5.0
2020-03-24 CVE-2019-4553 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM API Connect
IBM API Connect V5.0.0.0 through 5.0.8.7iFix3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2020-03-16 CVE-2020-6984 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Rockwellautomation products
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
network
low complexity
rockwellautomation CWE-327
5.0
2020-03-11 CVE-2019-5106 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Wago E!Cockpit 1.5.1.1
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1.
local
low complexity
wago CWE-327
2.1
2020-03-11 CVE-2011-2487 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.
network
high complexity
apache redhat CWE-327
5.9
2020-02-13 CVE-2012-5623 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Squirrelmail Change Passwd 4.0
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.
network
low complexity
squirrelmail CWE-327
5.0
2020-02-12 CVE-2019-4427 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud CLI
IBM Cloud CLI 0.6.0 through 0.16.1 windows installers are signed using SHA1 certificate.
network
low complexity
ibm microsoft CWE-327
5.0
2020-02-11 CVE-2013-2213 Use of a Broken or Risky Cryptographic Algorithm vulnerability in KDE Paste Applet
The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output.
local
low complexity
kde CWE-327
2.1
2020-02-04 CVE-2019-4540 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Directory Server
IBM Security Directory Server 6.4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2020-01-30 CVE-2020-5229 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Apereo Opencast
Opencast before 8.1 stores passwords using the rather outdated and cryptographically insecure MD5 hash algorithm.
network
low complexity
apereo CWE-327
5.5