Tag: cryptography
Insecure cookies can lead to unencrypted transmission of sensitive data.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.
Insecure string comparison can lead to a timing-attack.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Checks if the none
algorithm is used in a JWT token
parsing.