This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Pages that link to "Technical Impacts"
The following pages link to Technical Impacts:
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)- Plaintext Storage in Executable (← links)
- Plaintext Storage in File or on Disk (← links)
- Plaintext Storage in GUI (← links)
- Plaintext Storage in Memory (← links)
- Plaintext Storage of Sensitive Information (← links)
- Pointer Issues (← links)
- Porting Issues (← links)
- Predictability problems (← links)
- Predictable Exact Value from Previous Values (← links)
- Predictable Seed in PRNG (← links)
- Predictable Value Range from Previous Values (← links)
- Predictable from Observable State (← links)
- Private Array-Typed Field Returned From A Public Method (← links)
- Privilege / sandbox errors (← links)
- Privilege Chaining (← links)
- Privilege Context Switching Error (← links)
- Privilege Dropping / Lowering Errors (← links)
- Privilege Management Error (← links)
- Process Control (← links)
- Process information infoleak to other processes (← links)
- Product UI does not warn user of unsafe actions (← links)
- Product-External Error Message Infoleak (← links)
- Product-Generated Error Message Infoleak (← links)
- Proxied Trusted Channel (← links)
- Public Data Assigned to Private Array-Typed Field (← links)
- Race condition enabling link following (← links)
- Randomness and Predictability (← links)
- Record Delimiter (← links)
- Regular Expression Error (← links)
- Representation Errors (← links)
- Requirements Issues (← links)
- Resource Locking problems (← links)
- Resource Management Errors (← links)
- Resource leaks (← links)
- Response discrepancy infoleak (← links)
- Reversible One-Way Hash (← links)
- Sensitive Data Under Web Root (← links)
- Sensitive Information Uncleared Before Use (← links)
- Signal Errors (← links)
- Small Seed Space in PRNG (← links)
- Small Space of Random Values (← links)
- Static Value in Unpredictable Context (← links)
- Improper Data Validation (← links)
- Struts: Erroneous validate() Method (← links)
- Struts: Form Bean Does Not Extend Validation Class (← links)
- Struts: Form Field Without Validator (← links)
- Struts: Plug-in Framework Not In Use (← links)
- Struts: Unused Validation Form (← links)
- Struts: Unvalidated Action Form (← links)
- Struts: Validator Turned Off (← links)
- Struts: Validator Without Form Field (← links)
- Substitution Character (← links)
- System Configuration Issues (← links)
- System Operations Issues (← links)
- Technology-Specific Input Validation Problems (← links)
- Technology-Specific Special Elements (← links)
- Technology-Specific Time and State Issues (← links)
- Technology-specific Environment Issues (← links)
- Temporary File Issues (← links)
- Testing Issues (← links)
- The UI performs the wrong action (← links)
- Time and State (← links)
- Time of Introduction (← links)
- Time-of-check Time-of-use race condition (← links)
- Timing discrepancy infoleak (← links)
- Trailing Special Element (← links)
- Trapdoor (← links)
- Truncation of Security-relevant Information (← links)
- UI Misrepresentation of Critical Information (← links)
- UNIX Path Link problems (← links)
- UNIX file descriptor leak (← links)
- UNIX hard link (← links)
- UNIX symbolic link (symlink) following (← links)
- URL Encoding (Hex Encoding) (← links)
- Uncontrolled Search Path Element (← links)
- Undefined Behavior (← links)
- Undefined Parameter Error (← links)
- Undefined Value Error (← links)
- Unexpected Status Code or Return Value (← links)
- Unimplemented or unsupported feature in UI (← links)
- Unintended proxy/intermediary (← links)
- Unparsed Raw Web Content Delivery (← links)
- Unprotected Primary Channel (← links)
- Unquoted Search Path or Element (← links)
- Unrestricted Critical Resource Lock (← links)
- Unrestricted File Upload (← links)
- Unsafe JNI (← links)
- Unsafe Privilege (← links)
- Unsafe use of Reflection (← links)
- Untrusted Data Appended with Trusted Data (← links)
- Unverified Ownership (← links)
- Use of Less Trusted Source (← links)
- User Interface Quality Errors (← links)
- User Interface Security Errors (← links)
- User interface inconsistency (← links)
- User management errors (← links)
- Validate-Before-Canonicalize (← links)
- Validate-Before-Filter (← links)
- Value Delimiter (← links)
- Value Problems (← links)