Paid content will be excluded from the download. |
Filter
|
|
Matches : 909 |
Download
| Alert*
|
The software uses externally-controlled format strings in
printf-style functions, which can lead to buffer overflows or data
representation problems.
When an actor claims to have a given identity, the software
does not prove or insufficiently proves that the claim is
correct.
The web application does not, or can not, sufficiently verify
whether a well-formed, valid, consistent request was intentionally provided by
the user who submitted the request.
The software performs operations on a memory buffer, but it can
read from or write to a memory location that is outside of the intended boundary
of the buffer.
Weaknesses in this category are related to improper calculation
or conversion of numbers.
Weaknesses in this category are related to improper management
of system resources.
Weaknesses in this category are related to the use of
cryptography.
The software constructs all or part of an OS command using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
intended OS command when it is sent to a downstream
component.
The program accesses or uses a pointer that has not been
initialized.
The software constructs all or part of a code segment using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
syntax or behavior of the intended code segment.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies