> Veracode > Vulnerability Decoder Encapsulation
 

Vulnerability Decoder Encapsulation

White Paper Published By: Veracode
Veracode
Published:  Jun 26, 2019
Type:  White Paper
Length:  2 pages

Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.

An encapsulation attack can lead to service denial, cause security mechanisms to fail, or crash a server. There’s also the risk of damage to applications and other tools and resources, or a ransomware attack



Tags :