[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

The software attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.

The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.

The software does not properly verify that the source of data or communication is valid.

The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies