[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not properly verify that the source of data or communication is valid.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.

The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."

The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

The product divides a value by zero.

The product stores sensitive information in files or directories that are accessible to actors outside of the intended control sphere.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies