[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Weaknesses in this category are related to improper assignment or handling of permissions.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The software can be influenced by an attacker to open more files than are supported by the system.

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Weaknesses in this category are related to the use of cryptography.

Weaknesses in this category are related to the improper management of time and state in an environment that supports simultaneous or near-simultaneous computation by multiple systems, processes, or threads.

The software reads data past the end, or before the beginning, of the intended buffer.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies