The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files.
Explore 493 software weaknesses
Search 294,000+ vulnerabilities
Learn from real-world examples
Cybersecurity research & tools
Get in touch for collaboration
Explore more security resources