Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Double-Checked Locking

The product uses double-checked locking to access a resource without the overhead of explicit synchronization, but the locking is insufficient.