Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2024-12-13 CVE-2024-28980 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Recoverpoint for Virtual Machines 6.0
Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH.
network
low complexity
dell CWE-327
critical
9.8
2024-12-11 CVE-2023-37395 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Aspera Faspex
IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obtain sensitive information due to improper encryption of certain data.
local
low complexity
ibm CWE-327
3.3
2024-12-05 CVE-2024-48847 Use of a Broken or Risky Cryptographic Algorithm vulnerability in ABB products
MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes.  Affected products: ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01; MATRIX Series v3.08.01
network
low complexity
abb CWE-327
critical
9.1
2024-12-03 CVE-2024-41775 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cognos Controller 11.0.0/11.0.1
IBM Cognos Controller 11.0.0 and 11.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-11-21 CVE-2022-43934 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Broadcom Brocade Sannav
Brocade SANnav before Brocade SANnav 2.2.2 supports key exchange algorithms, which are considered weak on ports 24, 6514, 18023, 19094, and 19095.
network
low complexity
broadcom CWE-327
7.5
2024-11-15 CVE-2024-43189 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Concert Software 1.0.0/1.0.1
IBM Concert Software 1.0.0 through 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security.
network
high complexity
ibm CWE-327
5.9
2024-11-04 CVE-2024-51556 Use of a Broken or Risky Cryptographic Algorithm vulnerability in 63Moons Aero and Wave 2.0
This vulnerability exists in the Wave 2.0 due to insufficient encryption of sensitive data received at the API response.
network
low complexity
63moons CWE-327
6.5
2024-10-18 CVE-2024-10128 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Topdata Inner REP Plus 2.01
A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01.
network
low complexity
topdata CWE-327
4.9
2024-10-18 CVE-2024-48016 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Secure Connect Gateway 5.24.00.14
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability.
network
low complexity
dell CWE-327
8.8
2024-10-16 CVE-2024-47187 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Oisf Suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.
network
low complexity
oisf CWE-327
7.5