Insecure storage of cryptographic keys information

  1. A writable keystore
  2. A writable keystore protected by a weak password
  3. A readable file keystore
  4. A readable keystore, protected by a weak password, with private keys
  5. A readable keystore, protected by a weak password, with public keys
  6. A readable keystore containing private keys protected by a weak password
  7. Using a file keystore
  8. A keystore, protected by a weak password, containing private keys
  9. A keystore, protected by a weak password, containing public keys
  10. A keystore containing private keys protected by a weak password