[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper handling of communication channels and access paths.

The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.

The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

The product divides a value by zero.

The software provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.

The software does not correctly convert an object, resource or structure from one type to a different type.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies