Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2022-06-08 CVE-2022-24296 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mitsubishi products
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Air Conditioning System G-150AD Ver.
network
low complexity
mitsubishi CWE-327
5.0
2022-05-24 CVE-2022-29217 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
PyJWT is a Python implementation of RFC 7519.
network
low complexity
pyjwt-project fedoraproject CWE-327
5.0
2022-05-18 CVE-2022-30111 Use of a Broken or Risky Cryptographic Algorithm vulnerability in MCK Smartlock Project MCK Smartlock 1.0
Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks.
local
low complexity
mck-smartlock-project CWE-327
4.6
2022-05-10 CVE-2022-20117 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
In (TBD) of (TBD), there is a possible way to decrypt local data encrypted by the GSC due to improperly used crypto.
local
low complexity
google CWE-327
2.1
2022-05-09 CVE-2021-20479 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud PAK System
IBM Cloud Pak System 2.3.0 through 2.3.3.3 Interim Fix 1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2022-05-06 CVE-2022-29161 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Xwiki
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it.
network
xwiki CWE-327
6.8
2022-05-03 CVE-2022-1434 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Openssl 3.0.0/3.0.1/3.0.2
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key.
network
openssl CWE-327
4.3
2022-04-29 CVE-2021-39082 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Urbancode Deploy
IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2022-04-21 CVE-2022-29566 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Bulletproofs Project Bulletproofs
The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir generation because the hash computation fails to include all of the public values from the Zero Knowledge proof statement as well as all of the public values computed in the proof, aka the Frozen Heart issue.
6.8
2022-04-19 CVE-2021-39076 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium 10.5/11.3
IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information.
network
low complexity
ibm CWE-327
5.0