Home / Vulnerability Database / Config files : Unsafe password management
Config files

Config files : Unsafe password management

Overview

The application uses a password stored in plaintext or a bad hashed password in the configuration file. This can lead to the application data being compromised.

Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.

MEDIUM

DerScanner Severity Score

Do you want to fix Config files : Unsafe password management in your application?

See also

Config files

Config files : Text4Shell Vulnerability

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection