[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

Weaknesses in this category are related to improper handling of sensitive information.

The product does not sufficiently encapsulate critical data or functionality.

The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

The application does not sufficiently restrict access to a log file that is used for debugging.

The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.

The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.

The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.

Files or directories are accessible in the environment that should not be.

The software does not properly encode or decode the data, resulting in unexpected values.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   90

© SecPod Technologies