Tag: cryptography

Insecure connection using unencrypted protocol

Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.

Inefficient additional authenticated data (AAD) authenticity

Encryption can be improved by using Additional authenticated data (AAD).

Sensitive data stored unencrypted due to partial encryption

Encryption that is dependent on conditional logic, such as an if...then clause, might cause unencrypted sensitive data to be stored.

Insecure JSON web token (JWT) parsing

JWTs should not be parsed using the parse method.

Insecure cookie

Insecure cookies can lead to unencrypted transmission of sensitive data.

Insecure hashing

Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.

Insecure TLS version

TLS versions older than TLS version 1.1 support weak, broken, or misconfigured cryptography.

Insufficient number of PBEKeySpec iterations

Using less than 1,000 PBEKeySpec iterations is insecure.

Missing encryption of sensitive data in storage

Sensitive data is potentially persisted into storage or passed to another service without always being encrypted.

Insecure cryptography

Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.

Weak pseudorandom number generation

Insufficiently random generators (or hardcoded seeds) can make pseudorandom sequences predictable.