Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2024-08-01 CVE-2024-28972 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Insightiq 5.0.0
Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability.
network
low complexity
dell CWE-327
7.5
2024-07-31 CVE-2024-40465 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beego
An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
network
low complexity
beego CWE-327
8.8
2024-07-15 CVE-2024-39731 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Datacap
IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-07-02 CVE-2024-32852 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Powerscale Onefs
Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability.
network
low complexity
dell CWE-327
7.5
2024-06-27 CVE-2023-38371 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Access Manager 10.0.0.0/10.0.7.1
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-06-26 CVE-2024-29175 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System
Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability.
network
high complexity
dell CWE-327
5.9
2024-06-24 CVE-2024-3264 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mia Technology Inc.
network
low complexity
CWE-327
5.3
2024-06-21 CVE-2024-35537 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tvsmotor TVS Connect 4.6.0/5.0.0
TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption.
network
low complexity
tvsmotor CWE-327
7.5
2024-06-13 CVE-2024-32911 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
There is a possible escalation of privilege due to improperly used crypto.
network
low complexity
google CWE-327
critical
9.8
2024-06-12 CVE-2024-5559 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Schneider-Electric Powerlogic P5 Firmware
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device.
low complexity
schneider-electric CWE-327
6.8