|Paid content will be excluded from the download.
| Matches : 909
|The software writes data past the end, or before the beginning,
of the intended buffer.
Weaknesses in this category are related to the use of
The product uses a fixed or controlled search path to find
resources, but one or more locations in that path can be under the control of
Weaknesses in this category are typically found in
functionality that processes data.
Weaknesses in this category are related to errors in the
management of cryptographic keys.
Weaknesses in this category are related to improper calculation
or conversion of numbers.
An information exposure is the intentional or unintentional
disclosure of information to an actor that is not explicitly authorized to have
access to that information.
The software does not sufficiently verify the origin or
authenticity of data, in a way that causes it to accept invalid
The software constructs all or part of an LDAP query using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
intended LDAP query when it is sent to a downstream
Authenticating a user, or otherwise establishing a new user
session, without invalidating any existing session identifier gives an attacker
the opportunity to steal authenticated sessions.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies