[Forgot Password]
Login  Register Subscribe

24547

 
 

132176

 
 

122448

 
 

909

 
 

100878

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Weaknesses in this category are typically found in functionality that processes data.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies