Home » Vulnerabilities Knowledge Base » Sensitive Information Exposure via System Logs (Logcat Leakage)
This vulnerability occurs when an app logs sensitive information; such as usernames, passwords, tokens, API responses, or personal data; using methods like Log.d(), Log.e(), or Log.i() in Android. On rooted or debug-enabled devices, other apps can access these logs. If the device is compromised or stolen, attackers can extract the logged data. Even harmless-looking logs might reveal backend details, authentication headers, or user-specific debug info. Since logs stay on the device for some time, they pose a serious risk, especially in production environments.
This vulnerability can expose personal information, login credentials, or session tokens, and allow unauthorized access to backend systems. The risk is higher if the device is rooted, infected, or lost and it may also violate security policies or privacy laws like GDPR or HIPAA.


Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...