[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product does not properly control the amount of recursion that takes place, which consumes excessive resources, such as allocated memory or the program stack.

The product performs the same operation on a resource two or more times, when the operation should only be applied once.

The program invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.

This view (slice) displays only weakness base elements.

This view (graph) displays only composite weaknesses.

This view (slice) displays only weakness elements that are part of a chain.

Weaknesses in this category are related to improper handling of virtual files within Windows-based operating systems.

The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.


Pages:      Start    55    56    57    58    59    60    61    62    63    64    65    66    67    68    ..   90

© SecPod Technologies