Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
SD-330AC and AMC Manager provided by silex technology, Inc
PKIX draft CompositeVerifier accepts empty signature sequence as valid.
GOSTCTR implementation unable to process more than 255 blocks correctly
Semtech LR11xx Secure Boot Bypass
Meesho Online Shopping App com.meesho.supply endpoint risky encryption
fast-jwt has an incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key
Multiple vulnerabilities have been addressed in IBM Aspera Shares
Ubiquiti UniFi Devices Use of AES-CBC Allows Key Recovery and Unauthorized Device Control
AVideo has an unauthenticated decrypt oracle leaking any ciphertext
Authlib Vulnerable to JWE RSA1_5 Bleichenbacher Padding Oracle
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge
Use of a Broken or Risky Cryptographic Algorithm for firmware images of power analyzer
OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration
RustDesk Client Accepts Pseudo-Encrypted Config Strings Without Cryptographic Validation
RustDesk Server Generates Config Strings Using Reversible Encoding (Base64 + Reverse) Instead of Encryption
IBM MQ Appliance uses weaker than expected cryptographic algorithms
IBM Aspera faspio Gateway 1.3.7 has addressed a vulnerability affected by weak cryptographic algorithms
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH ...
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encry...
Copeland XWEB and XWEB Pro Use of a Broken or Risky Cryptographic Algorithm
Showing 1 - 20 of 1,000+ results