[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Functions that manipulate strings encourage buffer overflows.

Weaknesses in this category occur with improper enforcement of sandbox environments, or the improper handling, assignment, or management of privileges.

Weaknesses in this category are related to or introduced in the User Interface (UI).

Weaknesses in this category are related to improper management of system state.

Weaknesses in this category are related to improper handling of temporary files.

Weaknesses in this category are related to improper handling of time or state within particular technologies.

Weaknesses in this category are related to improper handling of time or state within J2EE.

Weaknesses in this category are related to the improper handling of signals.

If a function in a product does not generate the correct return/status codes, or if the product does not handle all possible return/status codes that could be generated by a function, then security issues may result.

Weaknesses in this category are related to improper handling of locks that are used to control access to resources.


Pages:      Start    71    72    73    74    75    76    77    78    79    80    81    82    83    84    ..   90

© 2013 SecPod Technologies