[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 909 Download | Alert*

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

The software includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the software, potentially granting total access and control of the software to the untrusted source.

The software defines a function that is used as a handler for more than one signal.

The software attempts to unlock a resource that is not locked.

The software contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock.

The software performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

The software records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.

The software requires that an actor should only be able to perform an action once, or to have only one unique action, but the software does not enforce or improperly enforces this restriction.

The software uses or specifies an encoding when generating output to a downstream component, but the specified encoding is not the same as the encoding that is expected by the downstream component.

Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   90

© 2013 SecPod Technologies