[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139176

 
 

909

 
 

113006

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

The software does not check or improperly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.

The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.

The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.

The software does not encrypt sensitive or critical information before storage or transmission.

The software may use insufficiently random numbers or values in a security context that depends on unpredictable numbers.

The product divides a value by zero.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies