Tag: cryptography
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Encryption can be improved by using Additional authenticated data (AAD).
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
JWTs should not be parsed using the parse
method.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
TLS versions older than TLS version 1.1 support weak, broken, or misconfigured cryptography.
Using less than 1,000 PBEKeySpec iterations is insecure.
Sensitive data is potentially persisted into storage or passed to another service without always being encrypted.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Insufficiently random generators (or hardcoded seeds) can make pseudorandom sequences predictable.