[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

The software reads data past the end, or before the beginning, of the intended buffer.

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

Weaknesses in this category are related to errors in the management of cryptographic keys.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies