|Paid content will be excluded from the download.
| Matches : 909
|Weaknesses in this category are related to improper handling of
communication channels and access paths.
The software constructs all or part of an LDAP query using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
intended LDAP query when it is sent to a downstream
The software performs a calculation that generates incorrect or
unintended results that are later used in security-critical decisions or
The lack of entropy available for, or used by, a Pseudo-Random
Number Generator (PRNG) can be a stability and security
The software does not maintain or incorrectly maintains control
over a resource throughout its lifetime of creation, use, and
This category includes weaknesses that occur when an
application does not properly handle errors that occur during
The product divides a value by zero.
The software provides an Applications Programming Interface
(API) or similar interface for interaction with external actors, but the
interface includes a dangerous method or function that is not properly
The software does not correctly convert an object, resource or
structure from one type to a different type.
Referencing memory after it has been freed can cause a program
to crash, use unexpected values, or execute code.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies