[Forgot Password]
Login  Register Subscribe

24547

 
 

132805

 
 

131373

 
 

909

 
 

108481

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to the improper management of time and state in an environment that supports simultaneous or near-simultaneous computation by multiple systems, processes, or threads.

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

The product stores sensitive information in files or directories that are accessible to actors outside of the intended control sphere.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Weaknesses in this category are related to errors in the management of cryptographic keys.

The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

The software writes data past the end, or before the beginning, of the intended buffer.

The product does not sufficiently encapsulate critical data or functionality.

The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies