Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-13 | CVE-2022-27581 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. | 6.5 |
2022-12-13 | CVE-2022-46832 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. | 6.5 |
2022-12-13 | CVE-2022-46833 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. | 6.5 |
2022-12-13 | CVE-2022-46834 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. | 6.5 |
2022-12-06 | CVE-2022-34361 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Secure Proxy 6.0.3 IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-11-14 | CVE-2022-34320 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1 IBM CICS TX 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-11-14 | CVE-2022-34319 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.7 IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 7.5 |
2022-11-12 | CVE-2022-45195 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Simplex Chat and Simplexmq SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. | 5.3 |
2022-10-31 | CVE-2021-27784 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech HCL Launch Container Image 7.1.0.1 The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key. | 7.5 |
2022-10-06 | CVE-2022-39237 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sylabs Singularity Image Format syslabs/sif is the Singularity Image Format (SIF) reference implementation. | 9.8 |