diff --git a/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.qhelp b/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.qhelp
index 003849b17cc..9757f2d49bf 100644
--- a/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.qhelp
+++ b/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.qhelp
@@ -23,11 +23,6 @@
decrypt sensitive data.
- If a weak hashing algorithm is used to protect data integrity, an
- attacker may be able to craft a malicious input that has the same
- hash as a benign one.
-
-
If a weak algorithm is used for digital signatures, an attacker may
be able to forge signatures and impersonate legitimate users.
diff --git a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
index 3c4dae2ae7b..cf84089e3d2 100644
--- a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
+++ b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
@@ -22,11 +22,6 @@
decrypt sensitive data.
- If a weak hashing algorithm is used to protect data integrity, an
- attacker may be able to craft a malicious input that has the same
- hash as a benign one.
-
-
If a weak algorithm is used for digital signatures, an attacker may
be able to forge signatures and impersonate legitimate users.
diff --git a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
index 89aa8f71a58..0c9e8fc289d 100644
--- a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
+++ b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
@@ -22,11 +22,6 @@
decrypt sensitive data.
- If a weak hashing algorithm is used to protect data integrity, an
- attacker may be able to craft a malicious input that has the same
- hash as a benign one.
-
-
If a weak algorithm is used for digital signatures, an attacker may
be able to forge signatures and impersonate legitimate users.