logo

CVE-2018-20718 VULNERABILITY TYPE: INJECTION.

   

Added on  2023-01-16

7 Pages477 Words75 Views
CVE-2018-20718
VULNERABILITY TYPE: INJECTION

Introduction
This type of vulnerability uses the injection
mode of the attack.
This attack can lead to the loss of control of
the system
The attack tries to change the flow of
control of the process of the system.
This attack is frequently used and can be
used in a variety of forms.
Some of the common ways to implement
this attack is by sending the malicious code
through legitimate data channels.

Vulnerability
The vulnerability is of type injection.
The software is capable of injecting
the attacker controlled data plan into
the user controlled data plan.
This injection attack can lead to many
parsing problems.
This vulnerability can also cause
buffer overflows and many other
problems.
The main vulnerability of this can lead
to system execution ability gain.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
TRANSCRIPT Slide 2: There are a few limited mitigation
|2
|443
|57

Desklib: Study Material Library with Solved Assignments & Essays
|15
|2888
|86

CRYPTOGRAPHY AND SECURITY VULNERABILITIES OF SYSTEMS
|12
|794
|21

Advanced E-Security: Defences against Injection Attacks, DLP Products, HTTPS, Cloud Services, and Cybersecurity Approaches
|13
|2962
|321

Secure Web Server: Attacks, SDLC Security Measures, and Protection Applications
|5
|1843
|221

Vulnerabilities in SCADA
|7
|1173
|237