Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-31 | CVE-2024-40465 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beego An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file | 8.8 |
2024-07-15 | CVE-2024-39731 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Datacap IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2024-06-28 | CVE-2024-37137 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Cloudlink Dell Key Trust Platform, v3.0.6 and prior, contains Use of a Cryptographic Primitive with a Risky Implementation vulnerability. | 5.5 |
2024-06-26 | CVE-2024-29175 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. | 5.9 |
2024-06-21 | CVE-2024-35537 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tvsmotor TVS Connect 4.6.0/5.0.0 TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption. | 7.5 |
2024-06-13 | CVE-2024-32911 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android There is a possible escalation of privilege due to improperly used crypto. | 9.8 |
2024-06-12 | CVE-2024-5559 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Schneider-Electric Powerlogic P5 Firmware CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device. | 6.8 |
2024-05-21 | CVE-2024-31989 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Argoproj Argo CD Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. | 9.0 |
2024-03-01 | CVE-2023-50312 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.2 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration. | 6.5 |
2024-02-23 | CVE-2023-51392 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Silabs Emberznet 7.2.0/7.2.3 Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks. | 9.8 |