HTTP Response Splitting [CWE-113] — The HacktivistsHTTP Response Splitting weakness describes improper neutralization of CRLF sequences in HTTP headers.May 24, 2022May 24, 2022
Buffer Errors [CWE-119] — The HacktivistsBuffer Errors weakness describes improper restriction of operations within the bounds of a memory buffer.May 24, 2022May 24, 2022
Improper Handling of Length Parameter Inconsistency [CWE-130] — The HacktivistsImproper Handling of Length Parameter Inconsistency is a security weakness that describes improper handling of a length field for…May 24, 2022May 24, 2022
Off-by-one Error [CWE-193] — The HacktivistsOff-by-one error occurs when a program uses an improper maximum or minimum value that is one more or one less than the proper value.May 24, 2022May 24, 2022
PHP File Inclusion [CWE-98] — The HacktivistsPHP File Inclusion weakness describes improper control of filename within Include() or Require() statements in a PHP program.May 24, 2022May 24, 2022
Code Injection [CWE-94] — The HacktivistsCode Injection weakness describes improper control of code generation.May 24, 2022May 24, 2022
XML Injection [CWE-91] — The HacktivistsXML Injection weakness describes improper neutralization of special elements used in XML queries.May 24, 2022May 24, 2022
LDAP Injection [CWE-90] — The HacktivistsLDAP Injection weakness describes improper neutralization of special elements used in LDAP queries.May 24, 2022May 24, 2022
SQL Injection [CWE-89] — The HacktivistsSQL Injection is a weakness that is caused by improper neutralization of special elements used in an SQL query.May 24, 2022May 24, 2022
Published inSystem WeaknessImproper Handling of Undefined Parameters [CWE-236] — The HacktivistsImproper Handling of Undefined Parameters describes a case when an application uses an undefined parameter, field, or argument.May 11, 2022May 11, 2022