Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2024-04-09 CVE-2024-29056 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Microsoft products
Windows Authentication Elevation of Privilege Vulnerability
network
low complexity
microsoft CWE-327
4.3
2024-04-02 CVE-2023-50313 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server 8.5/9.0
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration.
low complexity
ibm CWE-327
6.5
2024-02-12 CVE-2022-34309 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1
IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-12 CVE-2022-34310 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1/11.1.0.0
IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-10 CVE-2024-22361 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Semeru Runtime
IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-05 CVE-2024-24559 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Vyperlang Vyper
Vyper is a Pythonic Smart Contract Language for the EVM.
network
low complexity
vyperlang CWE-327
5.3
2024-02-02 CVE-2023-51838 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Meshcentral 1.1.16
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.
network
low complexity
meshcentral CWE-327
7.5
2024-02-02 CVE-2023-50937 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-02 CVE-2023-50939 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Powersc 1.3/2.0/2.1
IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2024-02-01 CVE-2024-1040 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gesslergmbh Web-Master Firmware 7.9
Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm.
local
low complexity
gesslergmbh CWE-327
4.4