rtk-rnjn/Parrot

(PTC-W1003) Audit required: Insecure hash function

Closed this issue · 0 comments

Description

D2, MD4, MD5, SHA1 signature algorithms are known to be vulnerable to collision attacks. Attackers can exploit this to generate another certificate with the same digital signature, allowing them to masquerade as the affected service.

Occurrences

There is 1 occurrence of this issue in the repository.

See all occurrences on DeepSource → deepsource.io/gh/rtk-rnjn/Parrot/issue/PTC-W1003/occurrences/