Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...
Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.