The software does not follow or incorrectly follows the specifications as required by the implementation language, environment, framework, protocol, or platform.
When leveraging external functionality, such as an API, it is important that the caller does so in accordance with the requirements of the external functionality or else unintended behaviors may result, possibly leaving the system vulnerable to any number of exploits.
|Other||['Quality Degradation', 'Varies by Context']|
|CVE-2006-7140||Crypto implementation removes padding when it shouldn't, allowing forged signatures||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7140|
|CVE-2006-4339||Crypto implementation removes padding when it shouldn't, allowing forged signatures||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339|
|映射的分类名||ImNode ID||Fit||Mapped Node Name|
|The CERT Oracle Secure Coding Standard for Java (2011)||MET10-J||Follow the general contract when implementing the compareTo() method|