[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

116471

 
 

909

 
 

91176

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper handling of sensitive information.

The product does not sufficiently encapsulate critical data or functionality.

The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

The application does not sufficiently restrict access to a log file that is used for debugging.

The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.

Files or directories are accessible in the environment that should not be.

The software does not properly encode or decode the data, resulting in unexpected values.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies