Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-08-07 | CVE-2016-5431 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in PHP Jose Project PHP Jose The PHP JOSE Library by Gree Inc. | 7.5 |
2019-08-05 | CVE-2019-5502 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Netapp Data Ontap SMB in Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 has weak cryptography which when exploited could lead to information disclosure or addition or modification of data. | 9.1 |
2019-08-02 | CVE-2019-7858 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Magento A cryptographic flaw in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9 and Magento 2.3 prior to 2.3.2 resulted in storage of sensitive information with an algorithm that is insufficiently resistant to brute force attacks. | 7.5 |
2019-07-15 | CVE-2019-13604 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Assaabloy HID Digitalpersona 4500 Firmware 24 There is a short key vulnerability in HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader v24. | 5.9 |
2019-06-29 | CVE-2019-13052 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Logitech Unifying Receiver Firmware Logitech Unifying devices allow live decryption if the pairing of a keyboard to a receiver is sniffed. | 6.5 |
2019-06-25 | CVE-2019-9836 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation. | 5.3 |
2019-06-25 | CVE-2019-4156 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Access Manager IBM Security Access Manager 9.0.1 through 9.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.9 |
2019-05-03 | CVE-2019-1706 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Cisco Adaptive Security Appliance Software A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. | 8.6 |
2019-04-25 | CVE-2018-1720 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling B2B Integrator IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2019-04-09 | CVE-2019-0688 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Microsoft products An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets, aka 'Windows TCP/IP Information Disclosure Vulnerability'. | 7.5 |