|Paid content will be excluded from the download.
| Matches : 909
|Certificates should be carefully managed and checked to assure
that data are encrypted with the intended owner's public
The software does not neutralize or incorrectly neutralizes
user-controllable input before it is placed in output that is used as a web page
that is served to other users.
Weaknesses in this category are related to improper management
of system resources.
The program accesses or uses a pointer that has not been
The product processes an XML document that can contain XML
entities with URLs that resolve to documents outside of the intended sphere of
control, causing the product to embed incorrect documents into its
This category includes weaknesses that occur when an
application does not properly handle errors that occur during
The software writes data past the end, or before the beginning,
of the intended buffer.
According to WASC, "Insufficient Session Expiration is when a
web site permits an attacker to reuse old session credentials or session IDs for
The software does not restrict or incorrectly restricts access
to a resource from an unauthorized actor.
Weaknesses in this category are related to the use of
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies