Displaying test cases 8501 - 8525 of 8528 in total
-
gets is never safe for untrusted input due to lack of buffer length checks.
-
An ad-hoc string copy with bounds check does not overflows a stack buffer.
-
An ad-hoc string copy without bounds check overflows a stack buffer.
-
An ad hoc gets with bounds check does not allow a stack buffer to be overrun.
-
An ad hoc gets without bounds checkes allows a stack buffer to be overrun.
-
A string decode function properly checks for termination and no buffer overflow occurs.
-
A string decode function misses a termination check which allows the decode to proceed past the end of the buffer.
-
Buffer overflow if the input is not validated. Every operation may write outside the bound of the statically allocated character array. From "Secure Coding in C and C++" by Robert C. Seacord. Page 28, Figure 2-2
-
Unprotected string copy, unlocked shared resource, realpath with fixed buffer. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: RACE, BUFF.OVER
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE, NUM.OBO
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource, realpath with fixed buffer. PLOVER: BUFF.OVER, RACE
-
Off-by-one bounds checking. PLOVER: BUFF.OVER, NUM.OBO
-
PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking on buffer. PLOVER: BUFF.OVER
-
Realpath with Fixed Buffer. PLOVER: BUFF.OVER
-
Buffer Overflow. This code has been donated by MIT. This test case has the following characteristics : write/read = Write, Which bound = Upper, Data type = character, Memory location = stack, Scope = same, Container = no, Pointer = no, Index complexity = constant, Address complexity = con...
-
snprintf is used repeatedly while keeping track of the residual buffer length, however an accounting error allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
snprintf with incorrect bounds allows a stack buffer to be overrun. PLOVER: BUFF.OVER, BUFF.LENCALC
-
A strcpy of a buffer with a missing NUL character causes a stack buffer to overflow. PLOVER: BUFF.OVER, BUFF.FORMAT
-
A strcpy of a buffer with a missing NUL character causes a stack buffer to overflow. PLOVER: BUFF.OVER, BUFF.FORMAT
-
fgets is called with an incorrect bounds allow a stack buffer to be overrun. PLOVER: BUFF.OVER