Displaying test cases 5026 - 5043 of 5043 in total
-
Unprotected string copy, unlocked shared resource. PLOVER: RACE, BUFF.OVER
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE, NUM.OBO
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource, realpath with fixed buffer. PLOVER: BUFF.OVER, RACE
-
Off-by-one bounds checking. PLOVER: BUFF.OVER, NUM.OBO
-
PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking on buffer. PLOVER: BUFF.OVER
-
Realpath with Fixed Buffer. PLOVER: BUFF.OVER
-
Buffer Overflow. This code has been donated by MIT. This test case has the following characteristics : write/read = Write, Which bound = Upper, Data type = character, Memory location = stack, Scope = same, Container = no, Pointer = no, Index complexity = constant, Address complexity = con...
-
snprintf is used repeatedly while keeping track of the residual buffer length, however an accounting error allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
A strcpy of a buffer with a missing NUL character causes a stack buffer to overflow. PLOVER: BUFF.OVER, BUFF.FORMAT
-
A strcpy of a buffer with a missing NUL character causes a stack buffer to overflow. PLOVER: BUFF.OVER, BUFF.FORMAT
-
fgets is called with an incorrect bounds allow a stack buffer to be overrun. PLOVER: BUFF.OVER
-
An ad-hoc string copy without bounds check overflows a stack buffer. PLOVER: BUFF.OVER
-
A stack overflow condition is a buffer overflow condition, where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). (from TCCLASP-5_2_3_10)