Rx iT World Hacking Tutorial
0
Use of Obsolete Methods
0

The use of deprecated or obsolete functions may indicate neglected code. As programming languages evolve, functions occasionally become obsolete due to: ...

0
Unsafe use of Reflection
0

This vulnerability is caused by unsafe use of the reflection mechanisms in programming languages like Java or C#. An attacker may be able to create unexpected ...

0
Unsafe function call from a signal handler
0

There are several functions which - under certain circumstances, if used in a signal handler - may result in the corruption of memory, allowing for ...

0
Unsafe Mobile Code
0

Mobile code, such as a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have little ...

0
Java Native Interface (JNI)
0

Improper use of the Java Native Interface (JNI) can render Java applications vulnerable to security flaws in other languages. Unsafe JNI errors occur when a ...

0
Unrestricted File Upload
0

Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack ...

0
String termination errors
0

Relying on proper string termination may result in a buffer overflow. String termination errors occur when: Data enters a program via a function that ...

0
Session Variable Overloading
0

Session Variable Overloading (also known as Session Puzzling) is an application level vulnerability which can enable an attacker to perform a variety of ...

0
Process Control
0

Executing commands from an untrusted source or in an untrusted environment can cause an application to execute malicious commands on behalf of an attacker. ...

0
Privacy Violation
0

Mishandling private information, such as customer passwords or social security numbers, can compromise user privacy, and is often illegal. Privacy violations ...

0
Poor Logging Practice
0

Loggers should be declared to be static and final. It is good programming practice to share a single logger object between all of the instances of a ...

0
Password Plaintext Storage
0

Storing a password in plaintext may result in a system compromise. Password management issues occur when a password is stored in plaintext in an application's ...

0
Hardcoded passwords
0

Hardcoded passwords may compromise system security in a way that cannot be easily remedied. It is never a good idea to hardcode a password. Not only does ...

0
PHP Object Injection
0

PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code ...

0
Missing XML Validation
0

Failure to enable validation when parsing XML gives an attacker the opportunity to supply malicious input. Most successful attacks begin with a violation of ...

0
Missing Error Handling
0

A web application must define a default error page for 404 errors, 500 errors, and to catch java.lang. Throwable exceptions prevent attackers from mining ...

0
Memory leak
0

A memory leak is an unintentional form of memory consumption whereby the developer fails to free an allocated block of memory when no longer needed. The ...

0
Insufficient Session-ID Length
0

The WebLogic deployment descriptor should specify a session identifier length of at least 128 bits. A shorter session identifier leaves the application open to ...

0
Insecure Transport
0

The application configuration should ensure that SSL is used for all access controlled pages. If an application uses SSL to guarantee confidential ...

0
Applications require temporary files
0

Applications require temporary files so frequently that many different mechanisms exist for creating them in the C Library and Windows® API. Most of these ...

RxHarun
Logo