[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

137225

 
 

909

 
 

112105

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The program does not release or incorrectly releases a resource before it is made available for re-use.

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

The software does not properly "clean up" and remove temporary or supporting resources after they have been used.

The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

A Pseudo-Random Number Generator (PRNG) uses seeds incorrectly.

The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   90

© SecPod Technologies