[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.

The product violates well-established principles for secure design.

This view (slice) covers issues that are found in C programs that are not common to all languages.

This view (slice) covers issues that are found in C++ programs that are not common to all languages.

The product does not handle or incorrectly handles a file name that identifies a "virtual" resource that is not directly specified within the directory that is associated with the file name, causing the product to perform file-based operations on a resource that is not a file.

This view (slice) covers issues that are found in Java programs that are not common to all languages.

This view (slice) covers issues that are found in PHP programs that are not common to all languages.

The software attempts to use a shared resource in an exclusive manner, but does not prevent or incorrectly prevents use of the resource by another thread or process.

The software calls a non-reentrant function in a concurrent context in which a competing code sequence (e.g. thread or signal handler) may have an opportunity to call the same function or otherwise influence its state.

The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.


Pages:      Start    53    54    55    56    57    58    59    60    61    62    63    64    65    66    ..   90

© SecPod Technologies