[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Weaknesses in this category are typically found within byte code or object code.

This category intends to capture the motivations and intentions of developers that lead to weaknesses that are found within CWE.

Weaknesses in this category were intentionally introduced by the developer, typically as a result of prioritizing other aspects of the program over security, such as maintenance.

The application contains code that appears to be malicious in nature.

The software appears to contain benign or useful functionality, but it also contains code that is hidden from normal operation that violates the intended security policy of the user or the system administrator.

Non-replicating malicious code only resides on the target system or software that is attacked; it does not attempt to spread to other systems.

Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully compromised the target system or software.

A software system that accepts path input in the form of multiple internal slash ('/multiple//internal/slash/') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.

A trapdoor is a hidden piece of code that responds to a special input, allowing its user access to resources without passing through the normal security enforcement mechanism.


Pages:      Start    36    37    38    39    40    41    42    43    44    45    46    47    48    49    ..   90

© SecPod Technologies