[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

140669

 
 

909

 
 

113959

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The application attempts to return a memory resource to the system, but calls the wrong release function or calls the appropriate release function incorrectly.

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

The software does not check or improperly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Weaknesses in this category are related to improper management of system state.

Weaknesses in this category are related to the management of credentials.

Weaknesses in this category are related to improper handling of communication channels and access paths.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies