[Forgot Password]
Login  Register Subscribe

24547

 
 

132176

 
 

122448

 
 

909

 
 

100878

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not correctly convert an object, resource or structure from one type to a different type.

Weaknesses in this category are related to improper handling of data within protection mechanisms that attempt to perform neutralization for untrusted data.

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Weaknesses in this category are related to the use of cryptography.

The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Weaknesses in this category are related to the management of credentials.

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies