[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

Weaknesses in this category are related to the use of cryptography.

An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

Weaknesses in this category are related to improper calculation or conversion of numbers.

Weaknesses in this category are related to improper management of system resources.

The software uses externally-controlled format strings in printf-style functions, which can lead to buffer overflows or data representation problems.

The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Weaknesses in this category are typically introduced during the configuration of the software.

Weaknesses in this category are typically introduced during code development, including specification, design, and implementation.

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies