Which of the following vulnerability/exploitation is referred above?

Attacker uses vulnerabilities in the authentication or session management functions such as
exposed accounts, session IDs, logout, password management, timeouts, remember me. secret
question, account update etc. to impersonate users, if a user simply closes the browser without
logging out from sites accessed through a public computer, attacker can use the same browser
later and exploit the user’s privileges. Which of the following vulnerability/exploitation is referred
above?

Attacker uses vulnerabilities in the authentication or session management functions such as
exposed accounts, session IDs, logout, password management, timeouts, remember me. secret
question, account update etc. to impersonate users, if a user simply closes the browser without
logging out from sites accessed through a public computer, attacker can use the same browser
later and exploit the user’s privileges. Which of the following vulnerability/exploitation is referred
above?

A.
Session ID in URLs

B.
Timeout Exploitation

C.
I/O exploitation

D.
Password Exploitation



Leave a Reply 0

Your email address will not be published. Required fields are marked *