[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

140669

 
 

909

 
 

113959

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.

Weaknesses in this category are related to improper calculation or conversion of numbers.

Weaknesses in this category are related to improper management of system resources.

Weaknesses in this category are typically introduced during the configuration of the software.

The software uses externally-controlled format strings in printf-style functions, which can lead to buffer overflows or data representation problems.

The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Weaknesses in this category are related to the improper management of time and state in an environment that supports simultaneous or near-simultaneous computation by multiple systems, processes, or threads.

The software does not correctly convert an object, resource or structure from one type to a different type.

Weaknesses in this category are typically introduced during code development, including specification, design, and implementation.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   90

© SecPod Technologies