Tag: cryptography
Insecure cookies can lead to unencrypted transmission of sensitive data.
Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Weak algorithm used for Password Hashing. Consider using stronger algorithms, such as Argon2, PBKDF2, or scrypt.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.