Home / Vulnerability Database / Java : Unsafe password management
Java

Java : Unsafe password management

Overview

The application uses a password stored in plaintext in the configuration file. This can lead to the application data being compromised.

Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.

MEDIUM

DerScanner Severity Score

Do you want to fix Java : Unsafe password management in your application?

See also

Java

Java : Race condition

Java

Java : Text4Shell Vulnerability

Java

Java : JNI usage