[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139226

 
 

909

 
 

113180

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The application does not sufficiently restrict access to a log file that is used for debugging.

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.

Weaknesses in this category can be used to access files outside of a restricted directory (path traversal) or to perform operations on files that would otherwise be restricted (path equivalence).

This tries to cover various problems in which improper data are included within a "container."

Weaknesses in this category are typically introduced during code development, including specification, design, and implementation.

The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.

Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

The software can be influenced by an attacker to open more files than are supported by the system.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   90

© SecPod Technologies