[Forgot Password]
Login  Register Subscribe

23631

 
 

114973

 
 

93492

 
 

909

 
 

77004

 
 

97

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

The software does not correctly convert an object, resource or structure from one type to a different type.

Weaknesses in this category are typically introduced during the configuration of the software.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

Weaknesses in this category are related to the use of cryptography.

The program does not release or incorrectly releases a resource before it is made available for re-use.

The software may use insufficiently random numbers or values in a security context that depends on unpredictable numbers.

The software does not properly verify that the source of data or communication is valid.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

The software receives data from an upstream component, but does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2016 SecPod Technologies