V1.4.1: Verify that the application uses memory-safe string, safer memory copy and pointer arithmetic to detect or prevent stack, buffer, or heap overflows.
ASVS Maturity
V1.4.2
V1.4.2: Verify that sign, range, and input validation techniques are used to prevent integer overflows.
ASVS Maturity
V1.4.3
V1.4.3: Verify that dynamically allocated memory and resources are released, and that references or pointers to freed memory are removed or set to null to prevent dangling pointers and use-after-free vulnerabilities.