[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

137225

 
 

909

 
 

112105

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not properly verify that the source of data or communication is valid.

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.

The software does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.

The software does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   90

© SecPod Technologies