CVE-2021-39182: Improper hashing in enrocrypt
(updated )
The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn’t know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm.
References
- github.com/Morgan-Phoenix/EnroCrypt
- github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce
- github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783
- github.com/advisories/GHSA-35m5-8cvj-8783
- github.com/pypa/advisory-database/tree/main/vulns/enrocrypt/PYSEC-2021-385.yaml
- nvd.nist.gov/vuln/detail/CVE-2021-39182
Detect and mitigate CVE-2021-39182 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →