13. Resource leaks, where a finite system resource such as memory or file handles are exhausted by repeated allocation without release.
14. Buffer overflow, in which a program tries to store data past the end of allocated storage. This may or may not lead to an access violation. These defects can form a security vulnerability.
66. High - The bug does not cause a failure, but causes the system to produce incorrect, incomplete, inconsistent results or impairs the system usability.
67. Medium – The bug does not cause a failure, does not impair usability, and does not interfere in the fluent work of the system and programs.
68.
69. High - This bug should be resolved as soon as possible in the normal course of development activity, before the software is released.
70. Medium – This bug should be repaired after serious bugs have been fixed.
93. Application programming interface (API) is an interface in computer science that defines the ways by which an application program may request services from libraries and/or OS.
124. IIS comes as a free component with Windows servers
125.
126. It is the world's second most popular web server in terms of overall websites.
127. Internet Information Services (IIS) 7.0 introduces a new XML-based configuration system for storing the IIS settings.
128.
129. Administration.config - This configuration file stores the settings for IIS management. These settings include the list of management modules that are installed for the IIS Manager tool, as well as configuration settings that any management module uses.
130.
131. The most flexible and cost-effective way to manage enterprise information.