[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146533

 
 

909

 
 

117189

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are typically found within source code.

The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

The software writes data past the end, or before the beginning, of the intended buffer.

The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.

The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.

The application does not sufficiently restrict access to a log file that is used for debugging.

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies