Paid content will be excluded from the download.
Matches : 909
Weaknesses in this category are typically found within source code.
The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
The software writes data past the end, or before the beginning, of the intended buffer.
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
The application does not sufficiently restrict access to a log file that is used for debugging.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.