Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
j
- JNDI Injection Description: JNDI injection (Java Naming and Directory Interface) is a type of attack that exploits Java's naming and directory interface to(...) Read more
- Java Code Injection Description: Java code injection is a type of cyber attack that allows an attacker to inject malicious code into an application, exploiting(...) Read more
- JavaScript Security Vulnerability Description: A security vulnerability in JavaScript refers to a weakness in the code or implementation of this programming language that can be(...) Read more
- JSP Session Fixation Description: Session fixation in JSP (JavaServer Pages) is a security vulnerability that allows an attacker to hijack a user's session in a web(...) Read more
- JavaScript Remote Code Execution Description: Remote code execution of JavaScript is a critical vulnerability that allows an attacker to execute arbitrary JavaScript code on a(...) Read more
- JavaScript File Inclusion Description: JavaScript file inclusion refers to a vulnerability that allows an attacker to inject and execute malicious JavaScript code within(...) Read more
- JavaScript Cross-Site Request Forgery Description: Cross-Site Request Forgery (CSRF) is a type of attack that tricks a user into executing unwanted actions on a different site than(...) Read more
- JavaScript Clickjacking Description: Clickjacking is a malicious technique that deceives users into clicking on elements of a web page that are not what they appear to(...) Read more
- JavaScript Denial of Service Description: Denial of service in JavaScript refers to a type of cyber attack that aims to make a web application inaccessible to its legitimate(...) Read more
- JavaScript Buffer Overflow Description: Buffer overflow is a security vulnerability that occurs when a program writes more data to a buffer than it can hold. This can lead(...) Read more
- JavaScript Memory Corruption Description: Memory corruption in JavaScript is a vulnerability that occurs when a program incorrectly manages memory, leading to unpredictable(...) Read more
- JavaScript API Vulnerability Description: API vulnerability in JavaScript refers to weaknesses in application programming interfaces (APIs) that can be exploited by(...) Read more
- JavaScript Event Handler Vulnerability Description: A vulnerability in JavaScript event handlers occurs when user-generated events are not properly validated, potentially allowing an(...) Read more
- JavaScript Prototype Pollution Description: Prototype pollution in JavaScript refers to a vulnerability that allows an attacker to modify the prototype of an object, leading(...) Read more
- JavaScript Security Misconfiguration Description: Incorrect security configuration in JavaScript is a vulnerability that arises from inadequate security settings in JavaScript(...) Read more