| Code | Vulnerability | Information About Vulnerabilty |
| ... | ||
| V42 | Acceptance meta code embedded within input data | Enables "stealth commanding" i.e., the insertion of specieal control or escape characters in data input -- e.g., "!" (which precedes command strings in UNIX shell scripts, and "%", which invokes system level commands in Perl) -- or complete control strings, such as those that may trigger hidden debug code and developer backdoors left in the deployed code. If the application's user interface code has this vulnerability, special characters may be used to insert entire progams in the application's data input fields, a technique called "cross site scripting" |
In reply to Re: Re: Acceptance meta code embedded within input data?
by Anonymous Monk
in thread Acceptance meta code embedded within input data?
by Anonymous Monk
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |