[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118989

 
 

909

 
 

93902

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Weaknesses in this category are related to errors in the management of cryptographic keys.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Weaknesses in this category are typically found in functionality that processes data.

The product divides a value by zero.

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

Weaknesses in this category are related to improper calculation or conversion of numbers.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies