|Paid content will be excluded from the download.
| Matches : 909
|The software can be influenced by an attacker to open more
files than are supported by the system.
Information written to log files can be of a sensitive nature
and give valuable guidance to an attacker or expose sensitive user
Weaknesses in this category are related to the use of
Weaknesses in this category are related to the improper
management of time and state in an environment that supports simultaneous or
near-simultaneous computation by multiple systems, processes, or
The software reads data past the end, or before the beginning,
of the intended buffer.
A web application accepts a user-controlled input that
specifies a link to an external site, and uses that link in a Redirect. This
simplifies phishing attacks.
Weaknesses in this category are related to the management of
The software does not neutralize or incorrectly neutralizes
user-controllable input before it is placed in output that is used as a web page
that is served to other users.
A NULL pointer dereference occurs when the application
dereferences a pointer that it expects to be valid, but is NULL, typically
causing a crash or exit.
The software constructs all or part of a command using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
intended command when it is sent to a downstream
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies