rspec/rules/S2115/rationale.adoc

2 lines
303 B
Plaintext
Raw Permalink Normal View History

When a database does not require a password for authentication, it allows anyone to access and manipulate the data stored within it. Exploiting this vulnerability typically involves identifying the target database and establishing a connection to it without the need for any authentication credentials.