[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

A product inherits a set of insecure permissions for an object, e.g. when copying from an archive file, without user awareness or involvement.

While it is executing, the software sets the permissions of an object in a way that violates the intended permissions that have been specified by the user.

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "..\" sequences that can resolve to a location that is outside of that directory.

The application does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the application in an invalid state.

The software does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.

The software assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.

The software does not properly verify that a critical resource is owned by the proper entity.

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

The software does not properly manage a user within its environment.


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    24    ..   90

© SecPod Technologies