The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.

Impact: Read Application Data
An attacker with access to the system could read sensitive information stored in cleartext (i.e., unencrypted). Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
javaphpcjavaasp.netotherothershellother
othershellother
other