[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software modifies the SSL context after connection creation has begun.

When the J2EE container attempts to write unserializable objects to disk there is no guarantee that the process will complete successfully.

The program compares object references instead of the contents of the objects themselves, preventing it from detecting equivalent objects.

The software does not correctly compare two objects based on their conceptual content.

The product uses the wrong operator when comparing a string, such as using "==" when the equals() method should be used instead.

The web application uses the GET method to process requests that contain sensitive information, which can expose that information through the browser's history, Referers, web logs, and other sources.

The software uses an OpenSSL Certificate without validating the certificate data.

The J2EE application is configured to use an insufficient session ID length.

Weaknesses in this category are related to improper handling of links within Unix-based operating systems.

The Servlet does not catch all exceptions, which may reveal sensitive debugging information.


Pages:      Start    46    47    48    49    50    51    52    53    54    55    56    57    58    59    ..   90

© SecPod Technologies