Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2024-04-02 CVE-2023-50313 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server 8.5/9.0
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration.
low complexity
ibm CWE-327
6.5
2024-02-10 CVE-2024-22361 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Semeru Runtime
IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-05 CVE-2024-24559 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Vyperlang Vyper
Vyper is a Pythonic Smart Contract Language for the EVM.
network
low complexity
vyperlang CWE-327
5.3
2024-02-05 CVE-2024-0323 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Br-Automation Automation Runtime 2.96/3.00
Use of a Broken or Risky Cryptographic Algorithm vulnerability in B&R Industrial Automation Automation Runtime (SDM modules). The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as SSLv3, TLSv1.0 and TLS1.1.
network
low complexity
br-automation CWE-327
critical
9.8
2024-02-02 CVE-2023-51838 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Meshcentral 1.1.16
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.
network
low complexity
meshcentral CWE-327
7.5
2024-02-02 CVE-2023-50937 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-02 CVE-2023-50939 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-01 CVE-2024-1040 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gesslergmbh Web-Master Firmware 7.9
Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm.
local
low complexity
gesslergmbh CWE-327
4.4
2024-01-29 CVE-2023-51839 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Devicefarmer Smartphone Test Farm 3.6.6
DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm.
network
low complexity
devicefarmer CWE-327
critical
9.1
2024-01-16 CVE-2024-21670 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hyperledger Ursa 0.1.0
Ursa is a cryptographic library for use with blockchains.
network
high complexity
hyperledger CWE-327
8.1