Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-08 | CVE-2022-24296 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mitsubishi products Use of a Broken or Risky Cryptographic Algorithm vulnerability in Air Conditioning System G-150AD Ver. | 5.0 |
2022-05-24 | CVE-2022-29217 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products PyJWT is a Python implementation of RFC 7519. | 5.0 |
2022-05-18 | CVE-2022-30111 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in MCK Smartlock Project MCK Smartlock 1.0 Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks. | 4.6 |
2022-05-10 | CVE-2022-20117 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android In (TBD) of (TBD), there is a possible way to decrypt local data encrypted by the GSC due to improperly used crypto. | 2.1 |
2022-05-09 | CVE-2021-20479 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud PAK System IBM Cloud Pak System 2.3.0 through 2.3.3.3 Interim Fix 1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.0 |
2022-05-06 | CVE-2022-29161 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Xwiki XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. | 6.8 |
2022-05-03 | CVE-2022-1434 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Openssl 3.0.0/3.0.1/3.0.2 The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. | 4.3 |
2022-04-29 | CVE-2021-39082 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.0 |
2022-04-21 | CVE-2022-29566 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Bulletproofs Project Bulletproofs The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir generation because the hash computation fails to include all of the public values from the Zero Knowledge proof statement as well as all of the public values computed in the proof, aka the Frozen Heart issue. | 6.8 |
2022-04-19 | CVE-2021-39076 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium 10.5/11.3 IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. | 5.0 |