[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software writes data past the end, or before the beginning, of the intended buffer.

Weaknesses in this category are related to the use of cryptography.

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

Weaknesses in this category are typically found in functionality that processes data.

Weaknesses in this category are related to errors in the management of cryptographic keys.

Weaknesses in this category are related to improper calculation or conversion of numbers.

An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies