This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Pages that link to "Technical Impacts"
The following pages link to Technical Impacts:
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)- Variable Name Delimiter (← links)
- Virtual Files (← links)
- Weak Encryption (← links)
- Wrong Data Type (← links)
- Wrong Status Code (← links)
- Code Correctness: Call to Thread.run() (← links)
- Code Correctness: Call to System.gc() (← links)
- Code Correctness: Erroneous finalize() Method (← links)
- EJB Bad Practices: Use of AWT/Swing (← links)
- EJB Bad Practices: Use of Class Loader (← links)
- EJB Bad Practices: Use of java.io (← links)
- EJB Bad Practices: Use of Sockets (← links)
- EJB Bad Practices: Use of Synchronization Primitives (← links)
- Poor Style: Explicit call to finalize() (← links)
- Password Management: Hardcoded Password (← links)
- Code Correctness: Double-Checked Locking (← links)
- Return Inside Finally Block (← links)
- Code Correctness: Class Does Not Implement Cloneable (← links)
- Code Correctness: Erroneous String Compare (← links)
- Code Correctness: Misspelled Method Name (← links)
- Code Correctness: null Argument to equals() (← links)
- Dead Code: Broken Override (← links)
- Dead Code: Expression is Always False (← links)
- Dead Code: Expression is Always True (← links)
- Dead Code: Unused Field (← links)
- Dead Code: Unused Method (← links)
- Poor Style: Confusing Naming (← links)
- Poor Style: Empty Synchronized Block (← links)
- Poor Style: Identifier Contains Dollar Symbol ($) (← links)
- Portability Flaw (← links)
- Poor Logging Practice (← links)
- Poor Logging Practice: Multiple Loggers (← links)
- Poor Logging Practice: Use of a System Output Stream (← links)
- System Information Leak: Missing Catch Block (← links)
- Unsafe Mobile Code (← links)
- Unsafe Mobile Code: Inner Class (← links)
- Unsafe Mobile Code: Public finalize() Method (← links)
- Unsafe Mobile Code: Dangerous Array Declaration (← links)
- Unsafe Mobile Code: Dangerous Public Field (← links)
- Missing XML Validation (← links)
- String Termination Error (← links)
- Struts: Form Does Not Extend Validation Class (← links)
- Unchecked Return Value: Missing Check against Null (← links)
- Weak credentials (← links)
- J2EE Bad Practices: JSP Expressions (← links)
- Vulnerability template (← links)
- Business Impact template (← links)
- Losing customers (← links)
- Damage to brand (← links)
- Loss of customer’s trust (← links)
- Lawsuit (← links)
- Legal costs associated with breach (← links)
- Criminal and civil judgments (← links)
- Financial penalties (← links)
- Censure by regulating agency (← links)
- Release of a single person’s information (← links)
- Mass release of people’s information (← links)
- Loss of employee information (← links)
- Loss of financial information (← links)
- Loss of healthcare information (← links)
- Loss of video rental information (← links)
- Expression Language Injection (← links)
- Anti CSRF Tokens ASP.NET (← links)
- Windows Identity Foundation (← links)
- DPAPI (← links)
- .NET Callbacks - Vulnerabilities and Remediation (← links)
- Dependency Injection (← links)
- IoC containers (← links)
- ASP.NET Identity (← links)
- .NET Memory Management (← links)
- Preventing SQL Injection in ADO.NET (← links)
- Authenticated Symmetric Encryption in .NET (← links)
- Information exposure through query strings in url (← links)