|Paid content will be excluded from the download.
| Matches : 909
|The software does not neutralize or incorrectly neutralizes
user-controllable input before it is placed in output that is used as a web page
that is served to other users.
The software does not restrict or incorrectly restricts access
to a resource from an unauthorized actor.
The software does not correctly convert an object, resource or
structure from one type to a different type.
An information exposure is the intentional or unintentional
disclosure of information to an actor that is not explicitly authorized to have
access to that information.
Software security is not security software. Here we're
concerned with topics like authentication, access control, confidentiality,
cryptography, and privilege management.
The product processes an XML document that can contain XML
entities with URLs that resolve to documents outside of the intended sphere of
control, causing the product to embed incorrect documents into its
Weaknesses in this category are related to improper assignment
or handling of permissions.
Weaknesses in this category are related to the management of
The software does not verify, or incorrectly verifies, the
cryptographic signature for data.
A NULL pointer dereference occurs when the application
dereferences a pointer that it expects to be valid, but is NULL, typically
causing a crash or exit.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies