[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

The software reads data past the end, or before the beginning, of the intended buffer.

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.

The software uses externally-controlled format strings in printf-style functions, which can lead to buffer overflows or data representation problems.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

The software writes data past the end, or before the beginning, of the intended buffer.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies