Cryptography vulnerabilities arise from improper implementation, weak algorithms, or mismanagement of cryptographic functions, potentially exposing sensitive data.
Cryptography Vulnerabilities Overview
Using Weak Cryptographic Algorithms
Insufficient Key Length
Hardcoded Cryptographic Keys
Insecure Random Number Generation
Using ECB Mode for Encryption
Missing Certificate Validation
rejectUnauthorized: false
in productionUsing Deprecated Hash Functions
Insufficient Entropy for Key Generation
Improper Certificate and Key Storage
Lack of Forward Secrecy
Weak Password-Based Key Derivation
Missing Authenticated Encryption
Insecure Cryptographic Storage
Using Broken or Risky Cryptographic Libraries
Improper Certificate Validation