Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-06-26 | CVE-2024-29175 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. | 5.9 |
2024-06-21 | CVE-2024-35537 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tvsmotor TVS Connect 4.6.0/5.0.0 TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption. | 7.5 |
2024-06-13 | CVE-2024-32911 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android There is a possible escalation of privilege due to improperly used crypto. | 9.8 |
2024-06-12 | CVE-2024-5559 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Schneider-Electric Powerlogic P5 Firmware CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device. | 6.8 |
2024-05-21 | CVE-2024-31989 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Argoproj Argo CD Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. | 9.0 |
2024-02-23 | CVE-2023-51392 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Silabs Emberznet 7.2.0/7.2.3 Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks. | 9.8 |
2024-02-02 | CVE-2023-51838 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Meshcentral 1.1.16 Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm. | 7.5 |
2024-02-01 | CVE-2024-1040 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gesslergmbh Web-Master Firmware 7.9 Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. | 4.4 |
2024-01-29 | CVE-2023-51839 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Devicefarmer Smartphone Test Farm 3.6.6 DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm. | 9.1 |
2024-01-12 | CVE-2023-49259 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hongdian H8951-4G-Esp Firmware The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time. | 7.5 |