|Paid content will be excluded from the download.
| Matches : 909
|The software prepares a structured message for communication
with another component, but encoding or escaping of the data is either missing
or done incorrectly. As a result, the intended structure of the message is not
The product uses untrusted input when calculating or using an
array index, but the product does not validate or incorrectly validates the
index to ensure the index references a valid position within the array.
Weaknesses in this category are related to the improper
management of time and state in an environment that supports simultaneous or
near-simultaneous computation by multiple systems, processes, or
Weaknesses in this category are typically found within source
The software performs a calculation that generates incorrect or
unintended results that are later used in security-critical decisions or
The product does not use or incorrectly uses a protection
mechanism that provides sufficient defense against directed attacks against the
Weaknesses in this category are related to improper management
of system state.
The software does not sufficiently delimit the arguments being
passed to a component in another control sphere, allowing alternate arguments to
be provided, leading to potentially security-relevant
The program accesses or uses a pointer that has not been
The software may use insufficiently random numbers or values in
a security context that depends on unpredictable numbers.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies