[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

137225

 
 

909

 
 

112105

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on how many resources can be allocated, in violation of the intended security policy for that actor.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

The software requires the use of XML documents and allows their structure to be defined with a Document Type Definition (DTD). The software allows the DTD to recursively define entities which can lead to explosive growth of data when parsed.

The product divides a value by zero.

The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.

The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies