Skip to content

Commit 2f22acd

Browse files
committed
Remove hashing example when not covered by query
1 parent 0bcdb91 commit 2f22acd

File tree

3 files changed

+0
-15
lines changed

3 files changed

+0
-15
lines changed

python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.qhelp

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,6 @@
2323
decrypt sensitive data.
2424
</li>
2525
<li>
26-
If a weak hashing algorithm is used to protect data integrity, an
27-
attacker may be able to craft a malicious input that has the same
28-
hash as a benign one.
29-
</li>
30-
<li>
3126
If a weak algorithm is used for digital signatures, an attacker may
3227
be able to forge signatures and impersonate legitimate users.
3328
</li>

ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,6 @@
2222
decrypt sensitive data.
2323
</li>
2424
<li>
25-
If a weak hashing algorithm is used to protect data integrity, an
26-
attacker may be able to craft a malicious input that has the same
27-
hash as a benign one.
28-
</li>
29-
<li>
3025
If a weak algorithm is used for digital signatures, an attacker may
3126
be able to forge signatures and impersonate legitimate users.
3227
</li>

rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,6 @@
2222
decrypt sensitive data.
2323
</li>
2424
<li>
25-
If a weak hashing algorithm is used to protect data integrity, an
26-
attacker may be able to craft a malicious input that has the same
27-
hash as a benign one.
28-
</li>
29-
<li>
3025
If a weak algorithm is used for digital signatures, an attacker may
3126
be able to forge signatures and impersonate legitimate users.
3227
</li>

0 commit comments

Comments
 (0)