cwong-scw / action-playground

0 stars 2 forks source link

Added feature 1 #11

Closed cwong-scw closed 3 years ago

cwong-scw commented 3 years ago

dfasfeawe

cwong-scw commented 3 years ago

dfkjer oa j aewrfij use-after-free fgsrefg

temp-scw-app[bot] commented 3 years ago

Micro-Learning Topic: Use After Free (Detected by phrase)

What is this? (2min video)

Dereferencing pointers to objects that have already been freed opens the door to execution of arbitrary code. Attackers may be able to insert instructions at the freed memory location in order to trigger the exploit when the pointer is used after the memory has been freed.

There are many ways this vulnerability may appear in code. Garbage collection, weak pointers, duplicate raw pointers, improperly written wrapper classes. The bottom line is to check the life time management of every memory or object reference and ensure that if memory is released then any reference or pointer falls out of scope or initialised to null.

Try this challenge in Secure Code Warrior

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef

temp-scw-app[bot] commented 3 years ago

abcdef