Confidently impact of a vulnerability
A vulnerability may have a different impact of confidential data to be retrieved if such a vulnerability is successfully exploited.
For example if usernames are retrieved, then such data can leak data about users.
If usernames consist of first and last names, then such data will be accessed also.
Comments
Post a Comment