Vulnerabilities
Memory Leak
Also known as: Resource leak
Definition
A defect where memory that is no longer needed is not released back to the allocator, gradually exhausting available memory and degrading or crashing the system.
Examples
- Long-running web server whose per-request allocations are never freed.
- Kernel module forgetting to release skb buffers, draining system memory.
Related terms
Vulnerability
A weakness in a system, application, or process that an attacker can exploit to violate confidentiality, integrity, or availability.
Denial-of-Service (DoS) Attack
An attack that exhausts a system's bandwidth, compute, memory, or application resources so that legitimate users can no longer access the service.
Memory Corruption
An umbrella term for vulnerabilities where a program writes outside the bounds of intended memory, undermining type-safety, control flow, or data integrity.
Secure Coding
Secure Coding — definition coming soon.
Use-After-Free
A memory-safety bug where a program continues to use memory after it has been freed, often allowing attackers to control object state and hijack execution.
Patch Management
The end-to-end process of identifying, testing, deploying, and verifying software updates that fix vulnerabilities or bugs.