CWE-328: CWE-328

14
Total CVEs
3
Critical
3
High
7.0
Avg CVSS

Yearly Trend

2025
9
2024
2
2023
3

Top Affected Vendors

1 Linuxfoundation 2
2 Google 1
3 Ibm 1
4 Pnpm 1
5 Mattermost 1
6 Samba 1
7 Abb 1
8 Amirraminfar 1
9 Crypto Js Project 1

All CWE-328 CVEs (14)

CVE-2025-27595
9.8

This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algorithms used by SICK DL100 devices. This compromises...

Mar 14, 2025
CVE-2022-45141
9.8

This vulnerability affects Samba Active Directory Domain Controllers that issue RC4-HMAC encrypted Kerberos tickets even when stronger encryption is a...

Mar 6, 2023
CVE-2023-46233
9.1

CVE-2023-46233 is a critical cryptographic weakness in crypto-js library where PBKDF2 defaults to insecure SHA1 hash with only 1 iteration, making pas...

Oct 25, 2023
CVE-2023-43635
8.8

This vulnerability in EVE OS's measured boot mechanism allows attackers to bypass TPM-based encryption of the sensitive 'vault' directory. The system ...

Sep 20, 2023
CVE-2024-48847
8.2

This vulnerability allows attackers to bypass MD5 checksum validation in ABB industrial control systems, potentially enabling malicious code execution...

Dec 5, 2024
CVE-2025-47276
7.5

Actualizer versions before 1.2.0 use OpenSSL's SHA512 for password hashing instead of stronger algorithms like Yescript/Argon2i, making password hashe...

May 13, 2025
CVE-2024-23589
6.8

CVE-2024-23589 is a cryptographic weakness vulnerability in HCL Glovius Cloud where outdated hash algorithms allow attackers to efficiently guess inpu...

May 30, 2025
CVE-2024-47829
6.5

This vulnerability in pnpm (package manager) uses MD5 hashing for path shortening, which can cause collisions where two different libraries get stored...

Apr 23, 2025
CVE-2024-38341
5.9

IBM Sterling Secure Proxy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information transmitted through the proxy...

May 28, 2025
CVE-2025-0508
5.9

This CVE describes an MD5 hash collision vulnerability in AWS SageMaker Python SDK's workflow component. It allows different workflow configurations t...

Mar 20, 2025
CVE-2025-59354
5.3

Dragonfly versions before 2.1.0 use MD5 hashing for file verification, which is cryptographically broken and allows attackers to create malicious file...

Sep 17, 2025
CVE-2024-10026
5.3

This vulnerability in Google's gVisor container runtime allows remote attackers to calculate a local IP address and per-boot identifier using weak has...

Jan 30, 2025
CVE-2024-47182
4.8

Dozzle versions before 8.5.3 use SHA-256 for password hashing, which is vulnerable to rainbow table attacks. This allows attackers with access to pass...

Sep 27, 2024
CVE-2025-9078
4.3

This vulnerability allows authenticated Mattermost users to access unauthorized posts and manipulate link previews through hash collision attacks on F...

Sep 15, 2025

About CWE-328 (CWE-328)

Our database tracks 14 CVEs classified as CWE-328, with 3 rated critical and 3 rated high severity. The average CVSS score for CWE-328 vulnerabilities is 7.0.

External reference: View CWE-328 on MITRE CWE →

Monitor CWE-328 Vulnerabilities

Get alerted when new CWE-328 CVEs affect your infrastructure.

Start Monitoring Free