[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

134312

 
 

909

 
 

108836

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

Weaknesses in this category are typically found in functionality that processes data.

The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.

The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

The software can be influenced by an attacker to open more files than are supported by the system.

The software does not verify, or incorrectly verifies, the cryptographic signature for data.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

Weaknesses in this category are related to improper handling of communication channels and access paths.

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies