|Paid content will be excluded from the download.
| Matches : 909
|Weaknesses in this category are typically found in
functionality that processes data.
The program contains a code sequence that can run concurrently
with other code, and the code sequence requires temporary, exclusive access to a
shared resource, but a timing window exists in which the shared resource can be
modified by another code sequence that is operating
The product calls free() twice on the same memory address,
potentially leading to modification of unexpected memory
The software uses externally-controlled format strings in
printf-style functions, which can lead to buffer overflows or data
The software performs a calculation that can produce an integer
overflow or wraparound, when the logic assumes that the resulting value will
always be larger than the original value. This can introduce other weaknesses
when the calculation is used for resource management or execution
An information exposure is the intentional or unintentional
disclosure of information to an actor that is not explicitly authorized to have
access to that information.
The product does not validate or incorrectly validates input
that can affect the control flow or data flow of a
The web application does not, or can not, sufficiently verify
whether a well-formed, valid, consistent request was intentionally provided by
the user who submitted the request.
Weaknesses in this category are related to improper assignment
or handling of permissions.
Certificates should be carefully managed and checked to assure
that data are encrypted with the intended owner's public
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies