[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144371

 
 

909

 
 

116125

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.

Weaknesses in this category are related to improper calculation or conversion of numbers.

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

The software uses or specifies an encoding when generating output to a downstream component, but the specified encoding is not the same as the encoding that is expected by the downstream component.

The software can be influenced by an attacker to open more files than are supported by the system.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   90

© SecPod Technologies