|Paid content will be excluded from the download.
| Matches : 909
|The application does not sufficiently restrict access to a log
file that is used for debugging.
Weaknesses in this category are typically found within source
Files or directories are accessible in the environment that
should not be.
The program accesses or uses a pointer that has not been
The software does not properly encode or decode the data,
resulting in unexpected values.
Any condition where the attacker has the ability to write an
arbitrary value to an arbitrary location, often as the result of a buffer
Weaknesses in this category are organized based on which phase
they are introduced during the software development and deployment
According to WASC, "Insufficient Session Expiration is when a
web site permits an attacker to reuse old session credentials or session IDs for
The product stores sensitive information in files or
directories that are accessible to actors outside of the intended control
An algorithm in a product has an inefficient worst-case
computational complexity that may be detrimental to system performance and can
be triggered by an attacker, typically using crafted manipulations that ensure
that the worst case is being reached.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies