...
Hard coding sensitive information exposes that information to attackers. Often, this information is sufficient for an attacker to obtain privilege escalation, and so the severity is high.The severity of this rule can vary based the kind of information that is disclosed. However, frequently the information disclosed is password or key information which can lead to remote exploitation. Consequently a high severity rating is given, but may be adjusted downwards based on the nature of the sensitive data.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC03-J | High | Probable | Medium | P12 | L1 |
...