[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139176

 
 

909

 
 

113006

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

The software performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies