Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-11-15 | CVE-2024-43189 | IBM Concert Software 1.0.0 through 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. | 5.9 |
2024-11-04 | CVE-2024-51556 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in 63Moons Aero and Wave 2.0 This vulnerability exists in the Wave 2.0 due to weak encryption of sensitive data received at the API response. | 6.5 |
2024-10-18 | CVE-2024-10128 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Topdata Inner REP Plus 2.01 A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. | 4.9 |
2024-10-16 | CVE-2024-47187 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-10-16 | CVE-2024-47188 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Oisf Suricata Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. | 7.5 |
2024-09-10 | CVE-2024-39583 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Insightiq 5.0.1/5.1.0 Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. | 9.8 |
2024-09-07 | CVE-2024-37068 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Maximo Application Suite 8.10/8.11/9.0 IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information using man in the middle techniques. | 7.5 |
2024-09-03 | CVE-2024-45394 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Authenticator Authenticator is a browser extension that generates two-step verification codes. | 7.8 |
2024-08-22 | CVE-2024-39745 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Connect Direct web Services IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-08-06 | CVE-2024-41270 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Appleboy Gorush An issue discovered in the RunHTTPServer function in Gorush v1.18.4 allows attackers to intercept and manipulate data due to use of deprecated TLS version. | 9.1 |