|Paid content will be excluded from the download.
| Matches : 909
|The product violates well-established principles for secure
The software attempts to use a shared resource in an exclusive
manner, but does not prevent or incorrectly prevents use of the resource by
another thread or process.
The software calls a non-reentrant function in a concurrent
context in which a competing code sequence (e.g. thread or signal handler) may
have an opportunity to call the same function or otherwise influence its
The software performs an operation on a resource at the wrong
phase of the resource's lifecycle, which can lead to unexpected
The software does not properly acquire a lock on a resource, or
it does not properly release a lock on a resource, leading to unexpected
resource state changes and behaviors.
The product exposes a resource to the wrong control sphere,
providing unintended actors with inappropriate access to the
The code contains a control flow path that does not reflect the
algorithm that the path is intended to implement, leading to incorrect behavior
any time this path is navigated.
The product uses security features in a way that prevents the
product's administrator from tailoring security settings to reflect the
environment in which the product is being used. This introduces resultant
weaknesses or prevents it from operating at a level of security that is desired
by the administrator.
The software uses, accesses, or otherwise operates on a
resource after that resource has been expired, released, or
The product does not prevent the definition of control spheres
from external actors.
Pages:      Start    12    13    14    15    16    17    18    19    20    21    22    23    24    25    ..   90
© 2013 SecPod Technologies