[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper handling of virtual files within Windows-based operating systems.

Weaknesses in this category are related to improper handling of virtual files within Mac-based operating systems.

Weaknesses in this category are caused by inadequately implemented input validation within particular technologies.

Weaknesses in this category are caused by inadequately implemented protection mechanisms that use the STRUTS framework.

Weaknesses in this category are related to the creation and modification of strings.

Weaknesses in this category are caused by improper data type transformation or improper handling of multiple data types.

Weaknesses in this category are introduced when inserting or converting data from one representation into another.

This entry has been deprecated. It is a leftover from PLOVER, but CWE-138 is a more appropriate mapping.

Weaknesses in this category are related to improper handling of special elements within particular technologies.

Weaknesses in this category are related to improper handling of data within protection mechanisms that attempt to perform neutralization for untrusted data.


Pages:      Start    70    71    72    73    74    75    76    77    78    79    80    81    82    83    ..   90

© 2013 SecPod Technologies