If the responses from these HTTP requests are leaked - for instance, in error messages - the attacker may even be able to read information from sensitive data stores.