|Paid content will be excluded from the download.
| Matches : 909
|The software imports, requires, or includes executable
functionality (such as a library) from a source that is outside of the intended
The software includes web functionality (such as a web widget)
from another domain, which causes it to operate within the domain of the
software, potentially granting total access and control of the software to the
The software defines a function that is used as a handler for
more than one signal.
The software attempts to unlock a resource that is not
The software contains multiple threads or executable segments
that are waiting for each other to release a necessary lock, resulting in
The software performs an iteration or loop without sufficiently
limiting the number of times that the loop is executed.
The program contains an iteration or loop with an exit
condition that cannot be reached, i.e., an infinite loop.
The software records password hashes in a data store, receives
a hash of a password from a client, and compares the supplied hash to the hash
obtained from the data store.
The software requires that an actor should only be able to
perform an action once, or to have only one unique action, but the software does
not enforce or improperly enforces this restriction.
The software uses or specifies an encoding when generating
output to a downstream component, but the specified encoding is not the same as
the encoding that is expected by the downstream component.
Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   90
© 2013 SecPod Technologies