Vendor | Product | Version |
---|---|---|
showdoc | showdoc | 𝑥 ≤ 2.9.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-325 - Missing Cryptographic StepThe product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
- CWE-347 - Improper Verification of Cryptographic SignatureThe software does not verify, or incorrectly verifies, the cryptographic signature for data.
References