[Forgot Password]
Login  Register Subscribe

24437

 
 

131950

 
 

117853

 
 

909

 
 

91655

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper management of system resources.

The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Weaknesses in this category are related to the management of credentials.

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

Weaknesses in this category are typically found in functionality that processes data.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

The program accesses or uses a pointer that has not been initialized.

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Weaknesses in this category are related to improper assignment or handling of permissions.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies