[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

This weakness has been deprecated because its name and description did not match. The description duplicated CWE-454, while the name suggested a more abstract initialization problem. Please refer to CWE-665 for the more abstract problem.

The software does not properly "clean up" and remove temporary or supporting resources after they have been used.

A software system that accepts path input in the form of trailing space ('filedir ') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.

The product does not clean up its state or incorrectly cleans up its state when an exception is thrown, leading to unexpected state or control flow.

Weaknesses in this category are related to improper handling of specific data structures.

Duplicate keys in associative lists can lead to non-unique keys being mistaken for an error.

The accidental deletion of a data-structure sentinel can cause serious programming logic problems.

The accidental addition of a data-structure sentinel can cause serious programming logic problems.

Weaknesses in this category are related to improper handling of pointers.

A function can return a pointer to memory that is outside of the buffer that the pointer is expected to reference.


Pages:      Start    31    32    33    34    35    36    37    38    39    40    41    42    43    44    ..   90

© SecPod Technologies