[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118831

 
 

909

 
 

92766

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

Weaknesses in this category are related to improper management of system state.

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The software does not correctly convert an object, resource or structure from one type to a different type.

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Weaknesses in this category are related to improper assignment or handling of permissions.

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

Weaknesses in this category are related to the management of credentials.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies