In this page you will get the list of vulnerabilities of Cryptographic and Key Management
Introduction to Password Storage