Displaying test cases 74476 - 74500 of 74617 in total
-
Attempted "double free" of allocated memory.
-
Syslog is called with a programmer supplied format string.
-
Syslog is called with a user supplied format string. An attempt was made to preformat the buffer but the vulnerability remains.
-
An ad-hoc string copy with bounds check does not overflows a stack buffer.
-
An ad-hoc string copy without bounds check overflows a stack buffer.
-
An ad hoc gets with bounds check does not allow a stack buffer to be overrun.
-
An ad hoc gets without bounds checkes allows a stack buffer to be overrun.
-
A string decode function properly checks for termination and no buffer overflow occurs.
-
A string decode function misses a termination check which allows the decode to proceed past the end of the buffer.
-
Syslog is called with a programmer supplied format string.
-
Printf is called with a programmer supplied format string.
-
Printf is called with a user supplied format string.
-
Attempt to call function of deleted object.
-
Memory allocated with new() function call is not freed with delete() call, nor is its pointer returned by the funcation.
-
Integer pointer is assigned a value within current buffer.
-
Character pointer is assigned value beyond current buffer using sizeof() function (with brackets).
-
Unprotected string copy, unlocked shared resource, off-by-one. PLOVER: BUFF.OVER, RACE, NUM.OBO
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE, NUM.OBO
-
Unprotected string copy, unlocked shared resource. PLOVER: BUFF.OVER, RACE
-
Unprotected string copy, unlocked shared resource. PLOVER: RACE, BUFF.OVER