[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2010.

Weaknesses in this category are related to the A10 category in the OWASP Top Ten 2010.

The web application does not neutralize or incorrectly neutralizes scripting elements within attributes of HTML IMG tags, such as the src attribute.

The software utilizes a shared resource in a concurrent manner but does not attempt to synchronize access to the resource.

The software utilizes a shared resource in a concurrent manner but it does not correctly synchronize access to the resource.

The program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

The program performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.

The program accesses or uses a pointer that has not been initialized.

The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid.

The program releases a resource that is still intended to be used by the program itself or another actor.


Pages:      Start    71    72    73    74    75    76    77    78    79    80    81    82    83    84    ..   90

© SecPod Technologies