Confidently impact of a vulnerability

​A vulnerability may have a different impact of confidential data to be retrieved if such a vulnerability is successfully exploited.

For example if usernames are retrieved, then such data can leak data about users.

If usernames consist of first and last names, then such data will be accessed also.

Comments

Popular posts from this blog

Absolute and relative path in HTML pages

Errors

goto PHP operator