"evaluatorComment":"SHA-1 is likely present in a large number of products across the entire IT sector. The applicability statement for this CVE will be updated when specific products are identified, as time and resources permit.",
"descriptions":[
{
"lang":"en",
"value":"SHA-1 is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of SHA-1 in TLS 1.2. NOTE: this CVE exists to provide a common identifier for referencing this SHA-1 issue; the existence of an identifier is not, by itself, a technology recommendation."
},
{
"lang":"es",
"value":"SHA-1 no es resistente a la colisi\u00f3n, lo que facilita a atacantes dependientes del contexto llevar a cabo ataques de espionaje, como es demostrado por ataques en el uso de SHA-1 en TLS 1.2. NOTA: esta CVE existe para dar un identificador com\u00fan para referenciar este problema de SHA-1; la existencia de un identificador no es, en si misma, una recomendaci\u00f3n tecnol\u00f3gica."