[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper handling of virtual files within Mac-based operating systems.

Weaknesses in this category are caused by inadequately implemented input validation within particular technologies.

Weaknesses in this category are caused by inadequately implemented protection mechanisms that use the STRUTS framework.

Weaknesses in this category are related to the creation and modification of strings.

Weaknesses in this category are caused by improper data type transformation or improper handling of multiple data types.

Weaknesses in this category are introduced when inserting or converting data from one representation into another.

This entry has been deprecated. It is a leftover from PLOVER, but CWE-138 is a more appropriate mapping.

Weaknesses in this category are related to improper handling of special elements within particular technologies.

Weaknesses in this category are related to improper handling of data within protection mechanisms that attempt to perform neutralization for untrusted data.

Integer coercion refers to a set of flaws pertaining to the type casting, extension, or truncation of primitive data types.


Pages:      Start    70    71    72    73    74    75    76    77    78    79    80    81    82    83    ..   90

© 2013 SecPod Technologies