OWASP Top Ten 2004 Category A8 - Insecure Storage
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
Weaknesses in this category are related to the A8 category in the OWASP Top Ten 2004.
Sensitive memory is cleared according to the source code, but compiler optimizations leave the memory untouched when it is not read from again, aka "dead store removal."
The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
The software does not encrypt sensitive or critical information before storage or transmission.
The application stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause the memory to be written to swap files on di...
When a device releases a resource such as memory or a file for reuse by other entities, information contained in the resource is not fully cleared prior to reuse of th...
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
The web application uses persistent cookies, but the cookies contain sensitive information.
Obscuring a password with a trivial encoding does not protect the password.
Deprecated or Obsolete
CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2004, and as required for compliance with PCI DSS version 1.1. This view is cons...
- A8 Insecure Storage