|Paid content will be excluded from the download.
| Matches : 909
|The software allows the attacker to upload or transfer files of
dangerous types that can be automatically processed within the product's
The software does not correctly convert an object, resource or
structure from one type to a different type.
Weaknesses in this category are typically introduced during the
configuration of the software.
Certificates should be carefully managed and checked to assure
that data are encrypted with the intended owner's public
Weaknesses in this category are related to the use of
The program does not release or incorrectly releases a resource
before it is made available for re-use.
The software may use insufficiently random numbers or values in
a security context that depends on unpredictable numbers.
The software does not properly verify that the source of data
or communication is valid.
The product processes an XML document that can contain XML
entities with URLs that resolve to documents outside of the intended sphere of
control, causing the product to embed incorrect documents into its
The software receives data from an upstream component, but does
not neutralize or incorrectly neutralizes CR and LF characters before the data
is included in outgoing HTTP headers.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2016 SecPod Technologies