[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

This view is useful for developers because it is organized around concepts with which developers are familiar, and it focuses on weaknesses that can be detected using source code analysis tools.&&This view (graph) organizes weaknesses using a hierarchical structure that is similar to that used by Seven Pernicious Kingdoms.

This view (slice) lists weaknesses that can be introduced during design.

This view (slice) lists weaknesses that can be introduced during implementation.

The software does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the software.

The software does not correctly convert an object, resource or structure from one type to a different type.

The software does not properly return control flow to the proper location after it has completed a task or detected an unusual condition.

The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.

The software does not enforce or incorrectly enforces that structured messages or data are well-formed before being read from an upstream component or sent to a downstream component.

The software assigns an owner to a resource, but the owner is outside of the intended control sphere.

This view (graph) displays Named Chains and their components.


Pages:      Start    58    59    60    61    62    63    64    65    66    67    68    69    70    71    ..   90

© SecPod Technologies