Tag: security
Questions Related to security
Identify the weakness in the below JSP file:
1 ...
2
3
4
8
9
11
12
13
14 function doBack()
15 {
16 history.go(-1);
17 }
18 function doDelete()
19 {
20 document.forms[0].action="/DeleteUsersAction";
21 document.forms[0].submit();
22 }
23
24 ...
Identify the weakness in the below JSP file:
1
2 ...
3 Dear User,
4
5 If you liked our services, then you would like to refer it to your friends.
6
7 Click on the below link:
8
9 <a href="/CWE/ReferAFriendAction?pageRedirect=">"> "Refer a Friend"!</a> 10 ...
11
Identify the Vulnerable Line # in the below code:
1 ...
2 public static Connection getConnection()
3 {
4 Connection con = null;
5 try
6 {
7 Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
8 con = DriverManager.getConnection("jdbc:odbc:Lookup","admin","admin");
9
10 }catch (ClassNotFoundException e)
11 {
12 if(con!=null)
13 close(con);
14 log.debug(“Error Occurred:” + e);
15
16 } catch(SQLException ex)
17 {
18
19 if(con!=null)
20 close(con);
21 log.debug(“Error Occurred:” + ex);
22 }
23 return con;
24 }
25 ...
Which of the following is a security advantage of managed code over unmanaged code?
Who is ultimately responsible for notifying authorities of a data or system theft?