Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,13 @@ The descriptive stack trace leaked by this application shows versions of softwar

**Business Impact**

This vulnerability can impact customers’ trust in the application which can result in reputational damage for the business and indirect financial losses.
This vulnerability could enable attacker exploitation that will disrupt product or service availability,
leading to financial loss and impact customers’ trust in the application.

**Steps to Reproduce**

1. Use a browser to navigate to: {{URL}}
1. Observe detailed error message showing a descriptive stack trace
2. Observe detailed error message showing a descriptive stack trace

**Proof of Concept (PoC)**

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,13 @@ The detailed server configuration leaked by this application shows which version

**Business Impact**

This vulnerability can impact customers’ trust in the application which can result in reputational damage for the business and indirect financial losses.
This vulnerability could enable attacker exploitation that will disrupt product or service availability,
leading to financial loss and impact customers’ trust in the application.

**Steps to Reproduce**

1. Use a browser to navigate to: {{URL}}
1. Observe detailed error message showing detailed server configuration
2. Observe detailed error message showing detailed server configuration

**Proof of Concept (PoC)**

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,13 @@ The full path disclosure leaked by this application displays implementation info

**Business Impact**

This vulnerability can impact customers’ trust in the application which can result in reputational damage for the business and indirect financial losses.
This vulnerability could enable attacker exploitation that will disrupt product or service availability,
leading to financial loss and impact customers’ trust in the application.

**Steps to Reproduce**

1. Use a browser to navigate to: {{URL}}
1. Observe detailed error message showing the full path disclosure
2. Observe detailed error message showing the full path disclosure

**Proof of Concept (PoC)**

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,13 @@ Visible detailed error pages are a result of improper error handling which intro

**Business Impact**

This vulnerability can impact customers’ trust in the application which can result in reputational damage for the business and indirect financial losses.
This vulnerability could enable attacker exploitation that will disrupt product or service availability,
leading to financial loss and impact customers’ trust in the application.

**Steps to Reproduce**

1. Use a browser to navigate to: {{URL}}
1. Observe detailed error message
2. Observe detailed error message

**Proof of Concept (PoC)**

Expand Down