[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 909 Download | Alert*

Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Weaknesses in this category are related to improper management of system resources.

The program accesses or uses a pointer that has not been initialized.

The product processes an XML document that can contain XML entities with URLs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

This category includes weaknesses that occur when an application does not properly handle errors that occur during processing.

The software writes data past the end, or before the beginning, of the intended buffer.

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Weaknesses in this category are related to the use of cryptography.

Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© 2013 SecPod Technologies