[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

125989

 
 

909

 
 

104881

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not restrict a reference to a Document Type Definition (DTD) to the intended control sphere. This might allow attackers to reference arbitrary DTDs, possibly causing the software to expose files, consume excessive system resources, or execute arbitrary http requests on behalf of the attacker.

The software defines a signal handler that contains code sequences that are not asynchronous-safe, i.e., the functionality is not reentrant, or it can be interrupted.

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

The software includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the software, potentially granting total access and control of the software to the untrusted source.

The software defines a function that is used as a handler for more than one signal.

The software attempts to unlock a resource that is not locked.

The software contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock.

The software performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

The software records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   90

© SecPod Technologies