[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

A process is invoked with sensitive arguments, environment variables, or other elements that can be seen by other processes on the operating system.

The application contains debugging code that can expose sensitive information to untrusted parties.

This tries to cover various problems in which improper data are included within a "container."

This weakness has been deprecated because it incorporated and confused multiple weaknesses. The issues formerly covered in this weakness can be found at CWE-766 and CWE-767.

This weakness has been deprecated because it was a duplicate of CWE-493. All content has been transferred to CWE-493.

The application stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

The application stores sensitive data under the FTP document root with insufficient access control, which might make it accessible to untrusted parties.

The software does not record, or improperly records, security-relevant information that leads to an incorrect decision or hampers later analysis.

The application truncates the display, recording, or processing of security-relevant information in a way that can obscure the source or nature of an attack.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   90

© SecPod Technologies