[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 909 Download | Alert*

The software does not restrict a reference to a Document Type Definition (DTD) to the intended control sphere. This might allow attackers to reference arbitrary DTDs, possibly causing the software to expose files, consume excessive system resources, or execute arbitrary http requests on behalf of the attacker.

The software defines a signal handler that contains code sequences that are not asynchronous-safe, i.e., the functionality is not reentrant, or it can be interrupted.

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

The software does not neutralize or incorrectly neutralizes "javascript:" or other URIs from dangerous attributes within tags, such as onmouseover, onload, onerror, or style.

The software includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the software, potentially granting total access and control of the software to the untrusted source.

The software defines a function that is used as a handler for more than one signal.

The software attempts to unlock a resource that is not locked.

The software contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock.

The software performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.

The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.


Pages:      Start    72    73    74    75    76    77    78    79    80    81    82    83    84    85    ..   90

© SecPod Technologies