Tag: information-leak

Loose file permissions

Weak file permissions can lead to privilege escalation.

Sensitive data stored unencrypted due to partial encryption

Encryption that is dependent on conditional logic, such as an if...then clause, might cause unencrypted sensitive data to be stored.

Insecure connection using unencrypted protocol

Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.

Insecure Socket Bind

Binding the socket with an empty IP address can introduce security risks.

Sensitive information leak

Exposure of sensitive information can lead to an unauthorized actor having access to the information.

Clear text credentials

Credentials that are stored in clear text can be intercepted by a malicious actor.