|Paid content will be excluded from the download.
| Matches : 909
|The web application does not, or can not, sufficiently verify
whether a well-formed, valid, consistent request was intentionally provided by
the user who submitted the request.
Weaknesses in this category are related to improper assignment
or handling of permissions.
Certificates should be carefully managed and checked to assure
that data are encrypted with the intended owner's public
The software can be influenced by an attacker to open more
files than are supported by the system.
Information written to log files can be of a sensitive nature
and give valuable guidance to an attacker or expose sensitive user
Weaknesses in this category are related to the management of
permissions, privileges, and other security features that are used to perform
The software does not neutralize or incorrectly neutralizes
user-controllable input before it is placed in output that is used as a web page
that is served to other users.
Weaknesses in this category are related to the use of
Weaknesses in this category are related to the improper
management of time and state in an environment that supports simultaneous or
near-simultaneous computation by multiple systems, processes, or
The software reads data past the end, or before the beginning,
of the intended buffer.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies