Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-23 | CVE-2018-18587 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Bigprof Appgini 5.70 BigProf AppGini 5.70 stores the passwords in the database using the MD5 hash. | 5.0 |
2018-09-11 | CVE-2018-11070 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Bsafe Crypto-J and RSA Bsafe Ssl-J RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. | 4.3 |
2018-09-11 | CVE-2018-11069 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Bsafe Ssl-J RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. | 4.3 |
2018-09-10 | CVE-2018-16806 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Pektron Passive Keyless Entry and Start System Firmware A Pektron Passive Keyless Entry and Start (PKES) system, as used on the Tesla Model S and possibly other vehicles, relies on the DST40 cipher, which makes it easier for attackers to obtain access via an approach involving a 5.4 TB precomputation, followed by wake-frame reception and two challenge/response operations, to clone a key fob within a few seconds. | 3.3 |
2018-08-31 | CVE-2018-11057 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x) contains a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. | 4.3 |
2018-08-17 | CVE-2018-15355 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Kraftway 24F2Xg Router Firmware Usage of SSLv2 and SSLv3 leads to transmitted data decryption in Kraftway 24F2XG Router firmware 3.5.30.1118. | 4.3 |
2018-07-20 | CVE-2017-1575 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling File Gateway 2.2.0.0 IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) uses weaker than expected cryptographic algorithms that could allow a local attacker to decrypt highly sensitive information. | 2.1 |
2018-06-27 | CVE-2017-16718 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beckhoff Twincat 3.0 Beckhoff TwinCAT 3 supports communication over ADS. | 4.3 |
2018-06-14 | CVE-2018-12420 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Icehrm IceHrm before 23.0.1.OS has a risky usage of a hashed password in a request. | 5.0 |
2018-06-11 | CVE-2018-5152 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. | 4.3 |