CWE-328: CWE-328
Yearly Trend
Top Affected Vendors
All CWE-328 CVEs (14)
This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algorithms used by SICK DL100 devices. This compromises...
Mar 14, 2025This vulnerability affects Samba Active Directory Domain Controllers that issue RC4-HMAC encrypted Kerberos tickets even when stronger encryption is a...
Mar 6, 2023CVE-2023-46233 is a critical cryptographic weakness in crypto-js library where PBKDF2 defaults to insecure SHA1 hash with only 1 iteration, making pas...
Oct 25, 2023This vulnerability in EVE OS's measured boot mechanism allows attackers to bypass TPM-based encryption of the sensitive 'vault' directory. The system ...
Sep 20, 2023This vulnerability allows attackers to bypass MD5 checksum validation in ABB industrial control systems, potentially enabling malicious code execution...
Dec 5, 2024Actualizer versions before 1.2.0 use OpenSSL's SHA512 for password hashing instead of stronger algorithms like Yescript/Argon2i, making password hashe...
May 13, 2025CVE-2024-23589 is a cryptographic weakness vulnerability in HCL Glovius Cloud where outdated hash algorithms allow attackers to efficiently guess inpu...
May 30, 2025This vulnerability in pnpm (package manager) uses MD5 hashing for path shortening, which can cause collisions where two different libraries get stored...
Apr 23, 2025IBM Sterling Secure Proxy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information transmitted through the proxy...
May 28, 2025This CVE describes an MD5 hash collision vulnerability in AWS SageMaker Python SDK's workflow component. It allows different workflow configurations t...
Mar 20, 2025Dragonfly versions before 2.1.0 use MD5 hashing for file verification, which is cryptographically broken and allows attackers to create malicious file...
Sep 17, 2025This vulnerability in Google's gVisor container runtime allows remote attackers to calculate a local IP address and per-boot identifier using weak has...
Jan 30, 2025Dozzle versions before 8.5.3 use SHA-256 for password hashing, which is vulnerable to rainbow table attacks. This allows attackers with access to pass...
Sep 27, 2024This vulnerability allows authenticated Mattermost users to access unauthorized posts and manipulate link previews through hash collision attacks on F...
Sep 15, 2025About CWE-328 (CWE-328)
Our database tracks 14 CVEs classified as CWE-328, with 3 rated critical and 3 rated high severity. The average CVSS score for CWE-328 vulnerabilities is 7.0.
External reference: View CWE-328 on MITRE CWE →
Monitor CWE-328 Vulnerabilities
Get alerted when new CWE-328 CVEs affect your infrastructure.
Start Monitoring Free