[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The application does not sufficiently restrict access to a log file that is used for debugging.

Weaknesses in this category are typically found within source code.

Files or directories are accessible in the environment that should not be.

The program accesses or uses a pointer that has not been initialized.

The software does not properly encode or decode the data, resulting in unexpected values.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

Weaknesses in this category are organized based on which phase they are introduced during the software development and deployment process.

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."

The product stores sensitive information in files or directories that are accessible to actors outside of the intended control sphere.

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies