[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115190

 
 

909

 
 

90025

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

The software records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.

The software requires that an actor should only be able to perform an action once, or to have only one unique action, but the software does not enforce or improperly enforces this restriction.

The software uses or specifies an encoding when generating output to a downstream component, but the specified encoding is not the same as the encoding that is expected by the downstream component.

The program checks a value to ensure that it does not exceed a maximum, but it does not verify that the value exceeds the minimum.

The software supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.

The software or the administrator places a user into an incorrect group.

The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   90

© SecPod Technologies