[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to the A7 category in the OWASP Top Ten 2004.

Weaknesses in this category are related to the A8 category in the OWASP Top Ten 2004.

The software allows user input to control or influence paths or file names that are used in filesystem operations.

Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2004.

Weaknesses in this category are related to the A10 category in the OWASP Top Ten 2004.

The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

The developer builds a security-critical protection mechanism into the software but the compiler optimizes the program such that the mechanism is removed or modified.

By following the CERT C Secure Coding Standard, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or o ...

Weaknesses in this category are related to rules in the preprocessor section of the CERT C Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.

Weaknesses in this category are related to rules in the declarations and initialization section of the CERT C Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.


Pages:      Start    61    62    63    64    65    66    67    68    69    70    71    72    73    74    ..   90

© SecPod Technologies