[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 909 Download | Alert*

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

Weaknesses in this category are typically found in functionality that processes data.

The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.

The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

The software can be influenced by an attacker to open more files than are supported by the system.

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

Weaknesses in this category are related to improper handling of communication channels and access paths.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.

Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies