It is possible to obtain source code from the application since it has only been partially obfuscated in a secure way. This could allow an attacker to understand the inner workings of the application.
- Understand the operation of the application in order to increase the attack vector.
- Identify validations performed by the front end.
Perform an obfuscation process to the code exposed in web applications.
Unauthorized user from the Internet.
⌚ 60 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The source code is stored using obfuscation techniques like a rename method
function calculatePay(a b){
while(b.c()){
b.a(true);
c.a();
b(c);
}
}
The source code has been stored without using any form of obfuscation
function calculatePay(SpecialList clientGroup){
while(clientGroup.HasMore()){
clientGroup.getNext(true);
client.updatePay();
makePay(client);
}
}