[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

241641

 
 

909

 
 

192372

 
 

277

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.

Functions that manipulate strings encourage buffer overflows.

The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

The software incorrectly checks a return value from a function, which prevents the software from detecting errors or exceptional conditions.

Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.

Weaknesses in this category are related to the management of credentials.

Storing a password in plaintext may result in a system compromise.

The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts.

Using an empty string as a password is insecure.

The software contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   90

© SecPod Technologies