[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit the software system.

The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.

By following the Top 25, developers will be able to significantly reduce the number of weaknesses that occur in their software.&&CWE entries in this view (graph) are listed in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors.

This category identifies Software Fault Patterns (SFPs) within the Privilege cluster.

This category identifies Software Fault Patterns (SFPs) within the Channel cluster.

This category identifies Software Fault Patterns (SFPs) within the Cryptography cluster.

This category identifies Software Fault Patterns (SFPs) within the Malware cluster.

This category identifies Software Fault Patterns (SFPs) within the Predictability cluster.

This category identifies Software Fault Patterns (SFPs) within the UI cluster.

This category identifies Software Fault Patterns (SFPs) within the Other cluster.


Pages:      Start    80    81    82    83    84    85    86    87    88    89    90    ..   90

© SecPod Technologies