Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-10 | CVE-2024-39583 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Insightiq 5.0.1/5.1.0 Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. | 9.8 |
2024-09-07 | CVE-2024-37068 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Maximo Application Suite 8.10/8.11/9.0 IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information using man in the middle techniques. | 7.5 |
2024-09-03 | CVE-2024-45394 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Authenticator Authenticator is a browser extensions that generates two-step verification codes. | 7.8 |
2024-08-22 | CVE-2024-39745 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Connect Direct web Services IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-08-06 | CVE-2024-41270 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Appleboy Gorush An issue discovered in the RunHTTPServer function in Gorush v1.18.4 allows attackers to intercept and manipulate data due to use of deprecated TLS version. | 9.1 |
2024-08-01 | CVE-2024-28972 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Insightiq 5.0.0 Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. | 7.5 |
2024-07-31 | CVE-2024-40465 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beego An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file | 8.8 |
2024-07-15 | CVE-2024-39731 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Datacap IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-07-02 | CVE-2024-32852 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability. | 7.5 |
2024-06-27 | CVE-2023-38371 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1 IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |