Researchers say they could lead to passwords, financial information, user locations, and other personal data being accessed by cyber attackers.