Tag: top25-cwes

OS command injection

Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.

SQL injection

The use of untrusted inputs in a SQL database query can enable attackers to read, modify, or delete sensitive data in the database.

Return Stack Address

A function returns the address of a stack variable will cause unintended program behavior, typically in the form of a crash.

Path traversal

Creating file paths from untrusted input might give a malicious actor access to sensitive files.

Out Of Bounds Read

Out of bounds read can allow attackers to read sensitive information from other memory locations or cause a crash.

Improper size of a memory buffer

The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

Out-of-bounds Write

Out of bounds write can allow attackers to write sensitive information from other memory locations or cause a crash.