The product does not record, or improperly records, security-relevant information that leads to an incorrect decision or hampers later analysis.
Explore 493 software weaknesses
Search 294,000+ vulnerabilities
Learn from real-world examples
Cybersecurity research & tools
Get in touch for collaboration
Explore more security resources