[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software locks a critical resource more times than intended, leading to an unexpected state in the system.

The software unlocks a critical resource more times than intended, leading to an unexpected state in the system.

The software declares a critical variable or field to be public when intended security policy requires it to be private.

The software defines a public method that reads or modifies a private variable.

The software contains a conditional statement with multiple logical expressions in which one of the non-leading expressions may produce side effects. This may lead to an unexpected state in the program after the execution of the conditional, because short-circuiting logic may prevent the side effects from occurring.

The software can be influenced by an attacker to open more files than are supported by the system.

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on how many resources can be allocated, in violation of the intended security policy for that actor.

The software does not properly maintain a reference to a resource that has been allocated, which prevents the resource from being reclaimed.

The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.


Pages:      Start    65    66    67    68    69    70    71    72    73    74    75    76    77    78    ..   90

© SecPod Technologies