[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software attempts to use a shared resource in an exclusive manner, but does not prevent or incorrectly prevents use of the resource by another thread or process.

The software calls a non-reentrant function in a concurrent context in which a competing code sequence (e.g. thread or signal handler) may have an opportunity to call the same function or otherwise influence its state.

The software performs an operation on a resource at the wrong phase of the resource's lifecycle, which can lead to unexpected behaviors.

The software does not properly acquire a lock on a resource, or it does not properly release a lock on a resource, leading to unexpected resource state changes and behaviors.

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.

The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the product is being used. This introduces resultant weaknesses or prevents it from operating at a level of security that is desired by the administrator.

The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

The product does not prevent the definition of control spheres from external actors.

The product does not properly control the amount of recursion that takes place, which consumes excessive resources, such as allocated memory or the program stack.


Pages:      Start    12    13    14    15    16    17    18    19    20    21    22    23    24    25    ..   90

© 2013 SecPod Technologies