VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
> Use of a Broken or Risky Cryptographic Algorithm
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
2022-12-20
CVE-2022-38391
Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Spectrum Control 5.4.0.0
IBM Spectrum Control 5.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm
CWE-327
7.5
7.5
2022-12-19
CVE-2022-4610
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Clickstudios Passwordstate
A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome.
local
low complexity
clickstudios
CWE-327
5.5
5.5
2022-12-13
CVE-2022-27581
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
CWE-327
6.5
6.5
2022-12-13
CVE-2022-46140
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Siemens products
Affected devices use a weak encryption scheme to encrypt the debug zip file.
network
low complexity
siemens
CWE-327
6.5
6.5
2022-12-13
CVE-2022-46832
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
CWE-327
6.5
6.5
2022-12-13
CVE-2022-46833
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
CWE-327
6.5
6.5
2022-12-13
CVE-2022-46834
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
CWE-327
6.5
6.5
2022-12-06
CVE-2022-34361
Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Secure Proxy 6.0.3
IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm
CWE-327
7.5
7.5
2022-11-14
CVE-2022-34320
Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1
IBM CICS TX 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm
CWE-327
7.5
7.5
2022-11-14
CVE-2022-34319
Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.7
IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm
CWE-327
7.5
7.5
«
Previous
1
2
...
6
7
8
(current)
9
10
...
36
37
»
Next