Back to the previous page
| Test Case ID | 231346 |
| Bad / Good / Mixed | Bad |
| Author | Wireshark Foundation |
| Associations | Test suite: 94 Application: 22 |
| Added by | SAMATE Team Staff |
| Language | Java |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | See INSTALL file for instructions on how to install. |
| Submission date | 2017-03-10 |
| Description | CVE-2013-2478 |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
File Contains:
CWE-125: Out-of-bounds Read on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
CWE-456: Missing Initialization of a Variable on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
CWE-680: Integer Overflow to Buffer Overflow on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
CWE-125: Out-of-bounds Read on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
CWE-456: Missing Initialization of a Variable on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
CWE-680: Integer Overflow to Buffer Overflow on line(s): 818, 819, 845, 850, 865, 867, 875, 881, 883, 888
File Contains:
CWE-680: Integer Overflow to Buffer Overflow on line(s): 158, 158, 172, 172, 188, 188
CWE-125: Out-of-bounds Read on line(s): 158, 158, 172, 172, 188, 188
CWE-456: Missing Initialization of a Variable on line(s): 158, 158, 172, 172, 188, 188
CWE-680: Integer Overflow to Buffer Overflow on line(s): 158, 158, 172, 172, 188, 188
CWE-125: Out-of-bounds Read on line(s): 158, 158, 172, 172, 188, 188
CWE-456: Missing Initialization of a Variable on line(s): 158, 158, 172, 172, 188, 188

