[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.

Weaknesses in this category are typically introduced during the configuration of the software.

Weaknesses in this category are typically introduced during code development, including specification, design, and implementation.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.

The product does not sufficiently encapsulate critical data or functionality.

Weaknesses in this category are related to improper handling of communication channels and access paths.

The product divides a value by zero.

The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies