CWE-328

Use of Weak Hash

21 CVEs Avg CVSS 6.6 MITRE
2
CRITICAL
3
HIGH
15
MEDIUM
1
LOW
2
POC
0
KEV

Monthly

CVE-2026-32129 HIGH PATCH This Week

Insufficient input padding in soroban-poseidon's Poseidon V1 hash function enables attackers to forge hash collisions by appending zeros to shorter inputs, allowing distinct messages to produce identical hashes when the input count is less than the sponge rate. This vulnerability affects any Soroban smart contract relying on PoseidonSponge or poseidon_hash for cryptographic integrity, potentially compromising authentication, signature verification, or other security mechanisms that depend on hash uniqueness. No patch is currently available.

Code Injection
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2025-41762 MEDIUM This Month

An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates. [CVSS 6.2 MEDIUM]

Authentication Bypass Information Disclosure Universal Bacnet Router Firmware
NVD
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-27754 MEDIUM This Month

Session cookie forgery in SODOLA SL902-SWTGW124AS firmware through version 200.1.20 stems from the use of cryptographically broken MD5 hashing for session token generation, allowing unauthenticated remote attackers to forge valid session cookies and gain unauthorized device access. The vulnerability requires no user interaction and affects all default configurations, with no patch currently available. MD5's known collision vulnerabilities combined with predictable token generation significantly lower the computational barrier for successful exploitation.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-59354 MEDIUM PATCH This Month

Dragonfly is an open source P2P-based file distribution and image acceleration system. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Dragonfly Suse
NVD GitHub
CVSS 4.0
5.5
EPSS
0.0%
CVE-2025-9078 MEDIUM PATCH This Month

Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to properly validate cache keys for link metadata which allows authenticated users. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Mattermost Server Suse
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-55053 MEDIUM This Month

CWE-328: Use of Weak Hash. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-41256 HIGH This Week

Cyberduck and Mountain Duck improperly implement TLS certificate pinning by storing certificate fingerprints using the cryptographically weak SHA-1 algorithm instead of modern alternatives like SHA-256. This allows attackers to potentially forge or spoof self-signed certificates and perform man-in-the-middle (MITM) attacks against users of affected versions. The vulnerability affects Cyberduck through version 9.1.6 and Mountain Duck through version 4.17.5; while no public POC or active KEV exploitation is currently documented, the CVSS 7.4 rating reflects high confidentiality and integrity impact.

Information Disclosure
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-49197 MEDIUM This Month

A security vulnerability in application uses a weak password (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2024-23589 MEDIUM This Month

Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs. Rated medium severity (CVSS 6.8). No vendor patch available.

Information Disclosure
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-48931 LOW Monitor

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
3.2
EPSS
0.0%
CVE-2026-32129
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Insufficient input padding in soroban-poseidon's Poseidon V1 hash function enables attackers to forge hash collisions by appending zeros to shorter inputs, allowing distinct messages to produce identical hashes when the input count is less than the sponge rate. This vulnerability affects any Soroban smart contract relying on PoseidonSponge or poseidon_hash for cryptographic integrity, potentially compromising authentication, signature verification, or other security mechanisms that depend on hash uniqueness. No patch is currently available.

Code Injection
NVD GitHub
CVE-2025-41762
EPSS 0% CVSS 6.2
MEDIUM This Month

An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates. [CVSS 6.2 MEDIUM]

Authentication Bypass Information Disclosure Universal Bacnet Router Firmware
NVD
CVE-2026-27754
EPSS 0% CVSS 6.5
MEDIUM This Month

Session cookie forgery in SODOLA SL902-SWTGW124AS firmware through version 200.1.20 stems from the use of cryptographically broken MD5 hashing for session token generation, allowing unauthenticated remote attackers to forge valid session cookies and gain unauthorized device access. The vulnerability requires no user interaction and affects all default configurations, with no patch currently available. MD5's known collision vulnerabilities combined with predictable token generation significantly lower the computational barrier for successful exploitation.

Authentication Bypass Sl902 Swtgw124as Firmware
NVD
CVE-2025-59354
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Dragonfly is an open source P2P-based file distribution and image acceleration system. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Dragonfly Suse
NVD GitHub
CVE-2025-9078
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to properly validate cache keys for link metadata which allows authenticated users. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Mattermost Server Suse
NVD
CVE-2025-55053
EPSS 0% CVSS 6.5
MEDIUM This Month

CWE-328: Use of Weak Hash. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVE-2025-41256
EPSS 0% CVSS 7.4
HIGH This Week

Cyberduck and Mountain Duck improperly implement TLS certificate pinning by storing certificate fingerprints using the cryptographically weak SHA-1 algorithm instead of modern alternatives like SHA-256. This allows attackers to potentially forge or spoof self-signed certificates and perform man-in-the-middle (MITM) attacks against users of affected versions. The vulnerability affects Cyberduck through version 9.1.6 and Mountain Duck through version 4.17.5; while no public POC or active KEV exploitation is currently documented, the CVSS 7.4 rating reflects high confidentiality and integrity impact.

Information Disclosure
NVD GitHub
CVE-2025-49197
EPSS 0% CVSS 6.5
MEDIUM This Month

A security vulnerability in application uses a weak password (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVE-2024-23589
EPSS 0% CVSS 6.8
MEDIUM This Month

Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs. Rated medium severity (CVSS 6.8). No vendor patch available.

Information Disclosure
NVD
CVE-2025-48931
EPSS 0% CVSS 3.2
LOW Monitor

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy