Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-11-22 | CVE-2017-8191 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei Fusionsphere Openstack V100R006C00Spc102(Nfv) FusionSphere OpenStack V100R006C00SPC102(NFV)has a week cryptographic algorithm vulnerability. | 5.9 |
2017-11-22 | CVE-2017-8157 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei products OceanStor 5800 V3 with software V300R002C00 and V300R002C10, OceanStor 6900 V3 V300R001C00 has an information leakage vulnerability. | 5.9 |
2017-10-30 | CVE-2012-4449 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Apache Hadoop Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack. | 9.8 |
2017-10-30 | CVE-2015-0226 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Apache Wss4J Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks information about decryption failures when decrypting an encrypted key or message data, which makes it easier for remote attackers to recover the plaintext form of a symmetric key via a series of crafted messages. | 7.5 |
2017-10-29 | CVE-2017-15998 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in NQ Contacts Backup & Restore 1.1 In the "NQ Contacts Backup & Restore" application 1.1 for Android, DES encryption with a static key is used to secure transmitted contact data. | 7.5 |
2017-10-29 | CVE-2017-15997 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in NQ Contacts Backup & Restore 1.1 In the "NQ Contacts Backup & Restore" application 1.1 for Android, RC4 encryption is used to secure the user password locally stored in shared preferences. | 7.8 |
2017-10-20 | CVE-2017-14937 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in PCU 2014 The airbag detonation algorithm allows injury to passenger-car occupants via predictable Security Access (SA) data to the internal CAN bus (or the OBD connector). | 4.7 |
2017-10-05 | CVE-2017-1339 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Tivoli Storage Manager IBM Spectrum Protect 7.1 and 8.1 (formerly Tivoli Storage Manager) Server uses weak encryption for the password. | 4.4 |
2017-08-18 | CVE-2014-9969 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android In all Qualcomm products with Android releases from CAF using the Linux kernel, the GPS client may use an insecure cryptographic algorithm. | 9.8 |
2017-08-05 | CVE-2017-9859 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in SMA products An issue was discovered in SMA Solar Technology products. | 9.8 |