Information Leakage

Sensitive data such as technical details of the application, developer comments, environment, or user-specific data is revealed. This sensitive data may then be used by an attacker to exploit the target application, its hosting network, or its users.

« Back to Glossary Index