Rx iT World Hacking Tutorial
Rx iT World Hacking Tutorial

Use of Obsolete Methods

The use of deprecated or obsolete functions may indicate neglected code. As programming ...
Rx iT World Hacking Tutorial

Unsafe use of Reflection

This vulnerability is caused by unsafe use of the reflection mechanisms in programming ...
Rx iT World Hacking Tutorial

Unsafe function call from a signal handler

There are several functions which - under certain circumstances, if used in a signal ...
Rx iT World Hacking Tutorial

Unsafe Mobile Code

Mobile code, such as a Java Applet, is code that is transmitted across a network and ...
Rx iT World Hacking Tutorial

Java Native Interface (JNI)

Improper use of the Java Native Interface (JNI) can render Java applications vulnerable ...
Rx iT World Hacking Tutorial

Unrestricted File Upload

Uploaded files represent a significant risk to applications. The first step in many ...
Rx iT World Hacking Tutorial

String termination errors

Relying on proper string termination may result in a buffer overflow. String termination ...
Rx iT World Hacking Tutorial

Session Variable Overloading

Session Variable Overloading (also known as Session Puzzling) is an application level ...
Rx iT World Hacking Tutorial

Process Control

Executing commands from an untrusted source or in an untrusted environment can cause an ...
Rx iT World Hacking Tutorial

Privacy Violation

Mishandling private information, such as customer passwords or social security numbers, ...
Rx iT World Hacking Tutorial

Poor Logging Practice

Loggers should be declared to be static and final. It is good programming practice to ...
Rx iT World Hacking Tutorial

Password Plaintext Storage

Storing a password in plaintext may result in a system compromise. Password management ...
Rx iT World Hacking Tutorial

Hardcoded passwords

Hardcoded passwords may compromise system security in a way that cannot be easily ...
Rx iT World Hacking Tutorial

PHP Object Injection

PHP Object Injection is an application level vulnerability that could allow an attacker ...
Rx iT World Hacking Tutorial

Missing XML Validation

Failure to enable validation when parsing XML gives an attacker the opportunity to supply ...
Rx iT World Hacking Tutorial

Missing Error Handling

A web application must define a default error page for 404 errors, 500 errors, and to ...
Rx iT World Hacking Tutorial

Memory leak

A memory leak is an unintentional form of memory consumption whereby the developer fails ...
Rx iT World Hacking Tutorial

Insufficient Session-ID Length

The WebLogic deployment descriptor should specify a session identifier length of at least ...
Rx iT World Hacking Tutorial

Insecure Transport

The application configuration should ensure that SSL is used for all access controlled ...
Rx iT World Hacking Tutorial

Applications require temporary files

Applications require temporary files so frequently that many different mechanisms exist ...
To Get Daily Health Newsletter

We don’t spam! Read our privacy policy for more info.

Download Mobile Apps
Follow us on Social Media
© 2012 - 2025; All rights reserved by authors. Powered by Mediarx International LTD, a subsidiary company of Rx Foundation.
RxHarun
Logo
Register New Account