Tag: information-leak

Insecure connection using unencrypted protocol

Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.

Sensitive data stored unencrypted due to partial encryption

Encryption that is dependent on conditional logic, such as an if...then clause, might cause unencrypted sensitive data to be stored.

Sensitive information leak

Sensitive information should not be exposed through log files or stack traces.

Clear text credentials

Credentials that are stored in clear text can be intercepted by a malicious actor.

Loose file permissions

Weak file permissions can lead to privilege escalation.

Client-side KMS reencryption

Client-side decryption followed by reencryption is inefficient and can lead to sensitive data leaks.