The application displays detailed error messages containing sensitive technical information that could aid attackers.
Error messages revealing stack traces, database queries, file paths, or version information help attackers understand the system and plan further attacks.
Implement custom error pages that do not reveal technical details. Log detailed errors server-side only. Use generic user-facing error messages. Review error handling across the application.