[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

A software system that accepts path input in the form of multiple internal backslash ('\multiple\trailing\\slash') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.

A backup file is stored in a directory that is accessible to actors outside of the intended control sphere.

Accessible test applications can pose a variety of security risks. Since developers or administrators rarely consider that someone besides themselves would even know about the existence of these applications, it is common for them to contain sensitive information or functions.

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

A server.log file was found. This can give information on whatever application left the file. Usually this can give full path names and system information, and sometimes usernames and passwords.

The application does not sufficiently restrict access to a log file that is used for debugging.

A command shell error message indicates that there exists an unhandled exception in the web application code. In many cases, an attacker can leverage the conditions that cause these errors in order to gain unauthorized access to the system.

A servlet error message indicates that there exists an unhandled exception in your web application code and may provide useful information to an attacker.

In many cases, an attacker can leverage the conditions that cause unhandled exception errors in order to gain unauthorized access to the system.

The product stores sensitive information in files or directories that are accessible to actors outside of the intended control sphere.


Pages:      Start    39    40    41    42    43    44    45    46    47    48    49    50    51    52    ..   90

© SecPod Technologies