[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118681

 
 

909

 
 

92673

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.

An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.

Weaknesses in this category are related to the use of cryptography.

The software writes data past the end, or before the beginning, of the intended buffer.

Weaknesses in this category are related to improper handling of communication channels and access paths.

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies