Tag: information-leak
Weak file permissions can lead to privilege escalation.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Binding the socket with an empty IP address can introduce security risks.
Exposure of sensitive information can lead to an unauthorized actor having access to the information.
Credentials that are stored in clear text can be intercepted by a malicious actor.