Resource Centre > Research Gateway > Veracode > Vulnerability Decoder Encapsulation

Vulnerability Decoder Encapsulation

Veracode

Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.

An encapsulation attack can lead to service denial, cause security mechanisms to fail, or crash a server. Theres also the risk of damage to applications and other tools and resources, or a ransomware attack

Email this page
Published:  Jun 26, 2019
Length:  2
Type:  White Paper
Tags :