|Paid content will be excluded from the download.
| Matches : 909
|The software performs a calculation that can produce an integer
overflow or wraparound, when the logic assumes that the resulting value will
always be larger than the original value. This can introduce other weaknesses
when the calculation is used for resource management or execution
The software reads data past the end, or before the beginning,
of the intended buffer.
Weaknesses in this category are related to the improper
management of time and state in an environment that supports simultaneous or
near-simultaneous computation by multiple systems, processes, or
The product calls free() twice on the same memory address,
potentially leading to modification of unexpected memory
Weaknesses in this category are related to improper handling of
communication channels and access paths.
Referencing memory after it has been freed can cause a program
to crash, use unexpected values, or execute code.
Software security is not security software. Here we're
concerned with topics like authentication, access control, confidentiality,
cryptography, and privilege management.
The software attempts to access a file based on the filename,
but it does not properly prevent that filename from identifying a link or
shortcut that resolves to an unintended resource.
Host-specific certificate data is not validated or is
incorrectly validated, so while the certificate read is valid, it may not be for
the site originally requested.
This category includes weaknesses that occur when an
application does not properly handle errors that occur during
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies