[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 909 Download | Alert*

The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Weaknesses in this category are typically introduced during the configuration of the software.

Weaknesses in this category are typically found in functionality that processes data.

The software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

The software does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.

The software uses externally-controlled format strings in printf-style functions, which can lead to buffer overflows or data representation problems.

The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.

Weaknesses in this category are related to the management of credentials.

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   90

© SecPod Technologies