Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Improper Verification of Cryptographic Signature

The software does not verify, or incorrectly verifies, the cryptographic signature for data. The weakness is introduced during Architecture and Design, Implementation stages.