243 vulnerabilities classified as CWE-312 (敏感数据的明文存储). AI Chinese analysis included.
CWE-312 represents a critical data protection weakness where sensitive information is stored in an unencrypted, readable format within a resource accessible to unauthorized entities. This flaw typically arises when developers fail to apply adequate cryptographic safeguards to data at rest, such as configuration files, logs, or local databases. Attackers exploit this vulnerability by gaining direct access to the storage medium, allowing them to easily extract credentials, personal identifiable information, or financial data without needing to bypass complex encryption algorithms. To mitigate this risk, developers must implement robust encryption standards, such as AES-256, for all sensitive data stored locally. Additionally, utilizing secure key management systems and ensuring that storage resources are strictly isolated from other control spheres helps prevent unauthorized access, thereby maintaining data confidentiality and integrity throughout its lifecycle.
response.addCookie( new Cookie("userAccountID", acctID);function persistLogin($username, $password){ $data = array("username" => $username, "password"=> $password); setcookie ("userdata", $data); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2016-8366 | Phoenix Contact ILC PLC 信任管理漏洞 — Phoenix Contact ILC PLCs | 7.3 | - | 2018-04-05 |
| CVE-2017-9663 | General Motors和Shanghai OnStar iOS Client 安全漏洞 — General Motors and Shanghai OnStar (SOS) iOS Client | 7.5 | - | 2018-01-09 |
| CVE-2017-3214 | Milwaukee ONE-KEY Android mobile应用程序信任管理问题漏洞 — ONE-KEY | 7.5 | - | 2017-06-20 |
Vulnerabilities classified as CWE-312 (敏感数据的明文存储) represent 243 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.