You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Steps To Reproduce
Rource code should be inspected for uses of weak cryptographic algorithms. These inspections may also reveal the use of
weak cryptography by third party code. Please avoid the following weak cryptographic algorithms, EC4B D&RB D&R3B MD5B RHA1B
MD4B &CNB ' CNC.
zowRecureqs automated testing for this vulnerability analyjes CommonCrypto API re•uests that use easily decrypted algo-
rithms and then attempts to decode or decrypt sensitive data.
Business Impact
Weak cryptographic algorithms have well documented vulnerabilities that can cause issues relating to loss of confidentiality
or an inability to maintain the integrity of business sensitive processes. The use of outdated cryptography may also affect an
organijationqs regulatory and compliance certifications.
Recommended Fix
Do not use weak cryptographic algorithms to protect information and processes such as EC4B D&RB D&R3B MD5B RHA1B MD4B
&CNB ' CNC
The text was updated successfully, but these errors were encountered:
Steps To Reproduce
Rource code should be inspected for uses of weak cryptographic algorithms. These inspections may also reveal the use of
weak cryptography by third party code. Please avoid the following weak cryptographic algorithms, EC4B D&RB D&R3B MD5B RHA1B
MD4B &CNB ' CNC.
zowRecureqs automated testing for this vulnerability analyjes CommonCrypto API re•uests that use easily decrypted algo-
rithms and then attempts to decode or decrypt sensitive data.
Business Impact
Weak cryptographic algorithms have well documented vulnerabilities that can cause issues relating to loss of confidentiality
or an inability to maintain the integrity of business sensitive processes. The use of outdated cryptography may also affect an
organijationqs regulatory and compliance certifications.
Recommended Fix
Do not use weak cryptographic algorithms to protect information and processes such as EC4B D&RB D&R3B MD5B RHA1B MD4B
&CNB ' CNC
The text was updated successfully, but these errors were encountered: