Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-327 (使用已被攻破或存在风险的密码学算法) — Vulnerability Class 254

254 vulnerabilities classified as CWE-327 (使用已被攻破或存在风险的密码学算法). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2020-7001 Moxa EDS-G516E和EDS-510E 加密问题漏洞 — Moxa EDS-G516E Series firmware, Version 5.2 or lower 7.5 -2020-03-24
CVE-2020-6987 Moxa PT-7528和PT-7828 加密问题漏洞 — Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower 7.5 -2020-03-24
CVE-2020-6984 多款Rockwell Automation产品加密问题漏洞 — Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior 7.5 -2020-03-16
CVE-2020-5229 Opencast stores passwords using outdated MD5 hash algorithm — opencast 7.7 High2020-01-30
CVE-2019-3700 yast: Fallback to DES without configuration in /etc/login.def — Factory 2.9 Low2020-01-24
CVE-2019-18340 Siemens SiNVR 3 Central Control Server和SiNVR 3 Video Server 加密问题漏洞 — Control Center Server (CCS) 5.5 Medium2019-12-12
CVE-2019-10929 多款Siemens产品加密问题漏洞 — SIMATIC CP 1626 5.9 -2019-08-13
CVE-2016-5431 Gree PHP JOSE Library 加密问题漏洞 — jose-php 7.5 -2019-08-07
CVE-2019-1828 Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability — Cisco Small Business RV Series Router Firmware 8.1 -2019-04-04
CVE-2019-7477 SonicWall SonicOS和SonicOSv 加密问题漏洞 — SonicOS 5.9 -2019-04-02
CVE-2019-3818 Linux kernel 加密问题漏洞 — kube-rbac-proxy 7.5 -2019-02-05
CVE-2019-0030 Juniper ATP: Password hashing uses DES and a hardcoded salt — Juniper ATP 9.8 -2019-01-15
CVE-2018-5382 Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions — Bouncy Castle 7.8 -2018-04-16
CVE-2017-5243 Rapid7 Nexpose 安全漏洞 — Nexpose hardware appliance 8.5 -2017-06-06

Vulnerabilities classified as CWE-327 (使用已被攻破或存在风险的密码学算法) represent 254 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.