Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-04-02 | CVE-2023-50313 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server 8.5/9.0 IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration. | 6.5 |
2024-02-10 | CVE-2024-22361 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Semeru Runtime IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-02-05 | CVE-2024-24559 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Vyperlang Vyper Vyper is a Pythonic Smart Contract Language for the EVM. | 5.3 |
2024-02-05 | CVE-2024-0323 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Br-Automation Automation Runtime 2.96/3.00 Use of a Broken or Risky Cryptographic Algorithm vulnerability in B&R Industrial Automation Automation Runtime (SDM modules). The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as SSLv3, TLSv1.0 and TLS1.1. | 9.8 |
2024-02-02 | CVE-2023-51838 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Meshcentral 1.1.16 Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm. | 7.5 |
2024-02-02 | CVE-2023-50937 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1 IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-02-02 | CVE-2023-50939 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1 IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-02-01 | CVE-2024-1040 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gesslergmbh Web-Master Firmware 7.9 Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. | 4.4 |
2024-01-29 | CVE-2023-51839 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Devicefarmer Smartphone Test Farm 3.6.6 DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm. | 9.1 |
2024-01-16 | CVE-2024-21670 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hyperledger Ursa 0.1.0 Ursa is a cryptographic library for use with blockchains. | 8.1 |