|Paid content will be excluded from the download.
| Matches : 909
|The product calls free() twice on the same memory address,
potentially leading to modification of unexpected memory
Weaknesses in this category are typically introduced during the
configuration of the software.
Weaknesses in this category are typically introduced during
code development, including specification, design, and
The program contains a code sequence that can run concurrently
with other code, and the code sequence requires temporary, exclusive access to a
shared resource, but a timing window exists in which the shared resource can be
modified by another code sequence that is operating
The product uses a search path that contains an unquoted
element, in which the element contains whitespace or other separators. This can
cause the product to access resources in a parent path.
When malformed or abnormal HTTP requests are interpreted by one
or more entities in the data flow between the user and the web server, such as a
proxy or firewall, they can be interpreted inconsistently, allowing the attacker
to "smuggle" a request to one device without the other device being aware of
The product does not sufficiently encapsulate critical data or
Weaknesses in this category are related to improper handling of
communication channels and access paths.
The product divides a value by zero.
The software attempts to access a file based on the filename,
but it does not properly prevent that filename from identifying a link or
shortcut that resolves to an unintended resource.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies