Vulnerabilities (CVE)

Filtered by CWE-327
Total 505 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4937 5 Hp, Ibm, Linux and 2 more 7 Hp-ux, Aix, I and 4 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 191814.
CVE-2020-4898 1 Ibm 1 Emptoris Strategic Supply Management 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Emptoris Strategic Supply Management 10.1.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190989.
CVE-2020-4831 1 Ibm 1 Datapower Gateway 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 189965.
CVE-2020-4778 1 Ibm 1 Curam Social Program Management 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Curam Social Program Management 7.0.9 and 7.0.10 uses MD5 algorithm for hashing token in a single instance which less safe than default SHA-256 cryptographic algorithm used throughout the Cúram application. IBM X-Force ID: 189156.
CVE-2020-4624 1 Ibm 1 Cloud Pak For Security 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM Cloud Pak for Security 1.3.0.1 (CP4S) uses weaker than expected cryptographic algorithms during negotiation could allow an attacker to decrypt sensitive information.
CVE-2020-4614 1 Ibm 1 Data Risk Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Data Risk Manager (iDNA) 2.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. IBM X-Force ID: 184927.
CVE-2020-4613 1 Ibm 1 Data Risk Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Data Risk Manager (iDNA) 2.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 184925.
CVE-2020-4596 2 Ibm, Linux 2 Security Guardium Insights, Linux Kernel 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Insights 2.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 184812.
CVE-2020-4595 2 Ibm, Linux 2 Security Guardium Insights, Linux Kernel 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Insights 2.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 184819.
CVE-2020-4594 2 Ibm, Linux 2 Security Guardium Insights, Linux Kernel 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Insights 2.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 184800.
CVE-2020-4452 1 Ibm 1 Api Connect 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM API Connect V2018.4.1.0 through 2018.4.1.11 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 181324.
CVE-2020-4379 1 Ibm 1 Spectrum Scale 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Spectrum Scale 5.0.0.0 through 5.0.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 179158.
CVE-2020-4367 1 Ibm 1 Planning Analytics Local 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Planning Analytics Local 2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 179001.
CVE-2020-4350 1 Ibm 1 Spectrum Scale 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Spectrum Scale 5.0.0.0 through 5.0.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 178424.
CVE-2020-4349 1 Ibm 1 Spectrum Scale 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Spectrum Scale 5.0.0.0 through 5.0.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 178423.
CVE-2020-4254 1 Ibm 1 Security Guardium Big Data Intelligence 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Big Data Intelligence 1.0 (SonarG) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 175560.
CVE-2020-4191 2 Ibm, Linux 2 Security Guardium, Linux Kernel 2024-11-21 2.1 LOW 4.4 MEDIUM
IBM Security Guardium 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174852.
CVE-2020-4185 1 Ibm 1 Security Guardium 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium 10.5, 10.6, and 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174803.
CVE-2020-4174 1 Ibm 1 Security Guardium Insights 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Insights 2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174683.
CVE-2020-4169 1 Ibm 1 Security Guardium Insights 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Security Guardium Insights 2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174405.