Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-15 | CVE-2024-39731 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Datacap IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-07-02 | CVE-2024-32852 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability. | 7.5 |
2024-06-24 | CVE-2024-3264 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mia Technology Inc. | 5.3 |
2024-06-21 | CVE-2024-35537 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tvsmotor TVS Connect 4.6.0/5.0.0 TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption. | 7.5 |
2024-06-13 | CVE-2024-32911 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android There is a possible escalation of privilege due to improperly used crypto. | 9.8 |
2024-04-09 | CVE-2024-29056 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Microsoft products Windows Authentication Elevation of Privilege Vulnerability | 4.3 |
2024-04-02 | CVE-2023-50313 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server 8.5/9.0 IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration. | 6.5 |
2024-02-12 | CVE-2022-34309 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1 IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-02-10 | CVE-2024-22361 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Semeru Runtime IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-02-05 | CVE-2024-24559 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Vyperlang Vyper Vyper is a Pythonic Smart Contract Language for the EVM. | 5.3 |