Displaying test cases 44201 - 44225 of 45437 in total
-
Off-by-one bounds checking. PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking. PLOVER: BUFF.OVER
-
Bounds checking off-by-one. PLOVER: BUFF.OVER, NUM.OBO
-
Bounds checking incorrect. PLOVER: BUFF.OVER
-
No bounds checking. PLOVER: BUFF.OVER
-
PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking on buffer. PLOVER: BUFF.OVER
-
Fixed strcpy
-
Realpath with Fixed Buffer. PLOVER: BUFF.OVER
-
Off-by-one bounds checking. PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking, null character. PLOVER: BUFF.OVER
-
Fixed version of memccpy.
-
Off-by-one bounds checking. PLOVER: BUFF.OVER, NUM.OBO
-
No bounds checking, null character. PLOVER: BUFF.OVER
-
Off-by-one error on bounds check, allows overflow. PLOVER: BUFF.OVER, NUM.OBO
-
PLOVER: BUFF.OVER No bounds checking, null character
-
TXT Record Overflow: CVE-2002-0906. Patched version. From MIT benchmarks (models/sendmail/s7) A buffer overflow poses the risk of a denial of service attack or possibly execution of arbitrary code via a malicious DNS server. Patched file: txt-dns-file-ok.c Patched line number: 315, 317
-
TXT Record Overflow: CVE-2002-0906. From MIT benchmarks (models/sendmail/s7) A buffer overflow poses the risk of a denial of service attack or possibly execution of arbitrary code via a malicious DNS server. Bad file: txt-dns-file-bad.c Bad line number: 328, 330 Taxonomy Classification: 000134...
-
tTflag Buffer Underrun: CVE-2001-0653. Patched version. From MIT benchmarks (models/sendmail/s6) Due to a type casting side effect (assigning unsigned int to signed int), it is possible to write data to a negative index of a buffer. Patched file: tTflag-ok.c Patched line number: 169
-
tTflag Buffer Underrun: CVE-2001-0653. From MIT benchmarks (models/sendmail/s6) Due to a type casting side effect (assigning unsigned int to signed int), it is possible to write data to a negative index of a buffer. Bad file: tTflag-bad.c Bad line number: 170 To fix, declare indexes as unsigne...
-
prescan() overflow: CA-2003-12 Patched version. From MIT benchmarks (models/sendmail/s5) The buffer overflow results from an unintended type cast from a signed character to a signed integer. Patched file: prescan-overflow-ok.c Patched line number: 404, 431, 535
-
prescan() overflow: CA-2003-12 From MIT benchmarks (models/sendmail/s5) The buffer overflow results from an unintended type cast from a signed character to a signed integer. Bad file: prescan-overflow-bad.c Bad line number: 399, 420, 519 Taxonomy Classification: 0000506111404
-
Sendmail 8.8.3/8.8.4 MIME Overflow CVE-1999-0047. Patched version. From MIT benchmarks (models/sendmail/s4) A remote attacker can send a cleverly crafted e-mail message and trigger a buffer overflow, gaining root access on the server running Sendmail. Patched file: mime2-ok.c Patched line numbe...
-
Sendmail 8.8.3/8.8.4 MIME Overflow CVE-1999-0047. From MIT benchmarks (models/sendmail/s4) A remote attacker can send a cleverly crafted e-mail message and trigger a buffer overflow, gaining root access on the server running Sendmail. Bad file: mime2-bad.c Bad line number: 203, 216, 230, 234, 2...
-
Sendmail 8.8.0/8.8.1 MIME Overflow CVE-1999-0206. Patched version. From MIT benchmarks (models/sendmail/s3) A remote attacker can send a cleverly crafted e-mail message and trigger a buffer overflow, gaining root access on the server running Sendmail. Patched file: mime1-ok.c Patched line numbe...