|Paid content will be excluded from the download.
| Matches : 909
|The program contains a code sequence that can run concurrently
with other code, and the code sequence requires temporary, exclusive access to a
shared resource, but a timing window exists in which the shared resource can be
modified by another code sequence that is operating
Files or directories are accessible in the environment that
should not be.
The program accesses or uses a pointer that has not been
The software does not properly encode or decode the data,
resulting in unexpected values.
Any condition where the attacker has the ability to write an
arbitrary value to an arbitrary location, often as the result of a buffer
Weaknesses in this category are organized based on which phase
they are introduced during the software development and deployment
According to WASC, "Insufficient Session Expiration is when a
web site permits an attacker to reuse old session credentials or session IDs for
The product stores sensitive information in files or
directories that are accessible to actors outside of the intended control
An algorithm in a product has an inefficient worst-case
computational complexity that may be detrimental to system performance and can
be triggered by an attacker, typically using crafted manipulations that ensure
that the worst case is being reached.
The software can be influenced by an attacker to open more
files than are supported by the system.
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90
© 2013 SecPod Technologies