Last update: September 12, 2016 Cleartext Transmission of Sensitive Information The weakness is introduced during Architecture and Design, Implementation, System Configuration stages.