Rx iT World Hacking Tutorial
Rx iT World Hacking Tutorial
Use of Obsolete Methods
The use of deprecated or obsolete functions may indicate neglected code.
As programming ...
Rx iT World Hacking Tutorial
Unsafe use of Reflection
This vulnerability is caused by unsafe use of the reflection mechanisms in programming ...
Rx iT World Hacking Tutorial
Unsafe function call from a signal handler
There are several functions which - under certain circumstances, if used in a signal ...
Rx iT World Hacking Tutorial
Unsafe Mobile Code
Mobile code, such as a Java Applet, is code that is transmitted across a network and ...
Rx iT World Hacking Tutorial
Java Native Interface (JNI)
Improper use of the Java Native Interface (JNI) can render Java applications vulnerable ...
Rx iT World Hacking Tutorial
Unrestricted File Upload
Uploaded files represent a significant risk to applications. The first step in many ...
Rx iT World Hacking Tutorial
String termination errors
Relying on proper string termination may result in a buffer overflow.
String termination ...
Rx iT World Hacking Tutorial
Session Variable Overloading
Session Variable Overloading (also known as Session Puzzling) is an application level ...
Rx iT World Hacking Tutorial
Process Control
Executing commands from an untrusted source or in an untrusted environment can cause an ...
Rx iT World Hacking Tutorial
Privacy Violation
Mishandling private information, such as customer passwords or social security numbers, ...
Rx iT World Hacking Tutorial
Poor Logging Practice
Loggers should be declared to be static and final.
It is good programming practice to ...
Rx iT World Hacking Tutorial
Password Plaintext Storage
Storing a password in plaintext may result in a system compromise.
Password management ...
Rx iT World Hacking Tutorial
Hardcoded passwords
Hardcoded passwords may compromise system security in a way that cannot be easily ...
Rx iT World Hacking Tutorial
PHP Object Injection
PHP Object Injection is an application level vulnerability that could allow an attacker ...
Rx iT World Hacking Tutorial
Missing XML Validation
Failure to enable validation when parsing XML gives an attacker the opportunity to supply ...
Rx iT World Hacking Tutorial
Missing Error Handling
A web application must define a default error page for 404 errors, 500 errors, and to ...
Rx iT World Hacking Tutorial
Memory leak
A memory leak is an unintentional form of memory consumption whereby the developer fails ...
Rx iT World Hacking Tutorial
Insufficient Session-ID Length
The WebLogic deployment descriptor should specify a session identifier length of at least ...



