[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146533

 
 

909

 
 

117189

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to the use of cryptography.

Weaknesses in this category are related to errors in the management of cryptographic keys.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

Weaknesses in this category are related to improper management of system resources.

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource.

The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

The software does not correctly convert an object, resource or structure from one type to a different type.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   90

© SecPod Technologies