Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-08 | CVE-2022-28382 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Verbatim products An issue was discovered in certain Verbatim drives through 2022-03-31. | 7.5 |
2022-06-08 | CVE-2022-24296 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mitsubishi products Use of a Broken or Risky Cryptographic Algorithm vulnerability in Air Conditioning System G-150AD Ver. | 7.5 |
2022-05-24 | CVE-2022-29249 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Javaez Project Javaez 1.6 JavaEZ is a library that adds new functions to make Java easier. | 7.5 |
2022-05-24 | CVE-2022-29217 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products PyJWT is a Python implementation of RFC 7519. | 7.5 |
2022-05-18 | CVE-2022-30111 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in MCK Smartlock Project MCK Smartlock 1.0 Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks. | 6.8 |
2022-05-10 | CVE-2022-20117 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android In (TBD) of (TBD), there is a possible way to decrypt local data encrypted by the GSC due to improperly used crypto. | 5.5 |
2022-05-09 | CVE-2021-20479 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud PAK System IBM Cloud Pak System 2.3.0 through 2.3.3.3 Interim Fix 1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-05-06 | CVE-2022-28164 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Broadcom Sannav 2.1.0/2.1.1/2.1.1.8 Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. | 6.5 |
2022-05-03 | CVE-2022-1434 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. | 5.9 |
2022-04-29 | CVE-2021-39082 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Urbancode Deploy IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |