Tag: cryptography
Insecure string comparison can lead to a timing-attack.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.