[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

This view outlines the most important issues as identified by the OWASP Top Ten (2007 version), providing a good starting point for web application developers who want to code more securely.&&CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2007.

Weaknesses in this category are related to improper handling of links within Windows-based operating systems.

CWE nodes in this view (slice) are being focused on by SAMATE.

CWE nodes in this view (graph) occur when the application handles particular system resources.

Weaknesses in this category affect file or directory resources.

Weaknesses in this category affect memory resources.

Weaknesses in this category affect system process resources during process invocation or inter-process communication (IPC).

CWE nodes in this view (slice) are used by NIST to categorize vulnerabilities within NVD.

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.

The software uses a more complex mechanism than necessary, which could lead to resultant weaknesses when the mechanism is not correctly understood, modeled, configured, implemented, or used.


Pages:      Start    50    51    52    53    54    55    56    57    58    59    60    61    62    63    ..   90

© SecPod Technologies