[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 909 Download | Alert*

A product can be used as an intermediary or proxy between an attacker and the ultimate target, so that the attacker can either bypass access controls or hide activities.

Weaknesses in this category can be used to access files outside of a restricted directory (path traversal) or to perform operations on files that would otherwise be restricted (path equivalence).

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.

The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.

The software does not properly verify that the source of data or communication is valid.

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

Weaknesses in this category are typically found within source code.

Weaknesses in this category are related to errors in the management of cryptographic keys.

Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies