[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.

Weaknesses in this category are related to the improper management of time and state in an environment that supports simultaneous or near-simultaneous computation by multiple systems, processes, or threads.

Weaknesses in this category are typically found within source code.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Weaknesses in this category are related to improper management of system state.

The software does not sufficiently delimit the arguments being passed to a component in another control sphere, allowing alternate arguments to be provided, leading to potentially security-relevant changes.

The program accesses or uses a pointer that has not been initialized.

The software may use insufficiently random numbers or values in a security context that depends on unpredictable numbers.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies