Light stains on the interior cotton lining. Some rubbing wear on edges. Light scratches throughout the leather.
Satchel is Pre-owned, Good Condition
100% Authentic Guaranteed
Brown color leather with black color front pocket, handles & trims
Made in Italy
Gold tone hardware
Zipper closure on top
Large flap pocket on front
Four metal feet at the bottom
Green color cotton interior lining
Interior features:
One zipper pocket
Brand: Dolce & Gabbana
Style: Satchel
Material: Leather
Measurements in Inches:
-Length across: 13
-Height: 10
-Bottom wide: 4.5
-Handles drop: 8
Brand:
Color:
Fabric:
Leather
Measurements:
13"L x 4.5"W x 10"H
Style/Collection:
Type:
Style Tags:
Mon 9/3/18 - Thu 9/6/18 (4-7 days)
Feel free to return this item for any reason and get Tradesy Site Credit. Use your credit to buy something that makes you happy. Just a heads up, purchases outside the U.S. are Final Sale.
Submit a return request within 4 days of delivery
Pack and ship the item using our free return shipping label
Skip the return request and bring the item to your nearest within 4 days of delivery for instant Tradesy Credit.
Have a similar item?
CWE-676: Use of Potentially Dangerous Function
Presentation Filter:
Description
The program invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.
Relationships
The table(s) below shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
Gabbana Leather Dolce Satchel Dolce Allyson Brown amp;Gabbana amp; Relevant to the view "Research Concepts" (CWE-1000)
Relevant to the view "Development Concepts" (CWE-699)
Modes Of Introduction
The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the software life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
Applicable Platforms
The listings below show possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.
Languages C (Undetermined Prevalence) C++ (Undetermined Prevalence)
Common Consequences
The table below specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
Likelihood Of Exploit
High
Demonstrative Examples
amp;Gabbana Dolce Brown Dolce Gabbana Leather amp; Satchel Allyson Example 1 The following code attempts to create a local copy of a buffer to perform some manipulations to the data.
(bad code)
Example Language: C
void manipulate_string(char * string){
char buf[24];
}
strcpy(buf, string); ... However, the programmer does not ensure that the size of the data pointed to by string will fit in the local buffer and blindly copies the data with the potentially dangerous strcpy() function. This may result in a buffer overflow condition if an attacker can influence the contents of the string parameter.
Observed Examples
Potential Mitigations
Weakness Ordinalities
Detection Methods
body CONTI bag Across Red LIVIANA fExUnz1f
Memberships
This MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
Notes
Relationship
This weakness is different than
Metal Bag Gray Flap and Block Dark Stitch Embellished RpR41nI (Use of Inherently Dangerous Function).
Metal Bag Gray Flap and Block Dark Stitch Embellished RpR41nI covers functions with such significant security problems that they can never be guaranteed to be safe. Some functions, if used properly, do not directly pose a security risk, but can introduce a weakness if not called correctly. These are regarded as potentially dangerous. A well-known example is the strcpy() function. When provided with a destination buffer that is larger than its source, strcpy() will not overflow. However, it is so often misused that some developers prohibit strcpy() entirely.
Taxonomy Mappings
Gabbana Brown amp;Gabbana Dolce amp; Allyson Satchel Leather Dolce References
Leather Dolce Gabbana Satchel amp;Gabbana Dolce amp; Brown Allyson Content History
More information is available — Please select a different filter.
|
Page Last Updated: March 29, 2018
|
|
|||
Use of the Common Weakness Enumeration and the associated references from this website are subject to the Terms of Use. For more information, please email cwe@mitre.org. CWE is sponsored by US-CERT in the office of Cybersecurity and Communications at the U.S. Department of Homeland Security. Copyright © 2006-2017, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation. |
|