Tag: top25-cwes
Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.
The use of untrusted inputs in a SQL database query can enable attackers to read, modify, or delete sensitive data in the database.
A function returns the address of a stack variable will cause unintended program behavior, typically in the form of a crash.
Creating file paths from untrusted input might give a malicious actor access to sensitive files.
Out of bounds read can allow attackers to read sensitive information from other memory locations or cause a crash.
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Out of bounds write can allow attackers to write sensitive information from other memory locations or cause a crash.