-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathraw_cwe_versus_warning_msg.txt
2333 lines (2333 loc) · 279 KB
/
raw_cwe_versus_warning_msg.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
CWE121_Stack_Based_Buffer_Overflow accessing out of bounds index. assert data_0 < 10;
CWE121_Stack_Based_Buffer_Overflow accessing out of bounds index. assert data < 10;
CWE121_Stack_Based_Buffer_Overflow accessing out of bounds index. assert data_1 < 10;
CWE121_Stack_Based_Buffer_Overflow accessing out of bounds index. assert i_0 < 50;
CWE121_Stack_Based_Buffer_Overflow accessing out of bounds index. assert i < 50;
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(&data);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data + 0);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data_0 + 0);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data_0 + i);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data_1 + i);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data + i);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(data + i_0);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(dataPtr1);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(&source[i]);
CWE121_Stack_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(&source[i_0]);
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow Address of stack memory allocated by call to alloca() on line X returned to caller
CWE121_Stack_Based_Buffer_Overflow all target addresses were invalid. This path is assumed to be dead.
CWE121_Stack_Based_Buffer_Overflow Array access (from variable 'data') results in a null pointer dereference
CWE121_Stack_Based_Buffer_Overflow Array 'buffer[10]' accessed at index 10, which is out of bounds.
CWE121_Stack_Based_Buffer_Overflow Array 'dataBadBuffer[10]' accessed at index 10, which is out of bounds.
CWE121_Stack_Based_Buffer_Overflow Array 'dataBadBuffer[50]' accessed at index 99, which is out of bounds.
CWE121_Stack_Based_Buffer_Overflow Assigned value is garbage or undefined
CWE121_Stack_Based_Buffer_Overflow Calling undeclared function alloca. Old style K&R code?
CWE121_Stack_Based_Buffer_Overflow Completely invalid destination for assigns
CWE121_Stack_Based_Buffer_Overflow Condition '5!=5' is always false
CWE121_Stack_Based_Buffer_Overflow Condition '5==5' is always true
CWE121_Stack_Based_Buffer_Overflow Condition 'data>=0' is always true
CWE121_Stack_Based_Buffer_Overflow Dereference of undefined pointer value
CWE121_Stack_Based_Buffer_Overflow Does not check for buffer overflows when concatenating to destination (CWE-120). Consider using strcat_s, strncat, or strlcat (warning, strncat is easily misused).
CWE121_Stack_Based_Buffer_Overflow Does not check for buffer overflows when copying to destination (CWE-120). Consider using strcpy_s, strncpy, or strlcpy (warning, strncpy is easily misused).
CWE121_Stack_Based_Buffer_Overflow Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE121_Stack_Based_Buffer_Overflow Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE121_Stack_Based_Buffer_Overflow Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE121_Stack_Based_Buffer_Overflow Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings.
CWE121_Stack_Based_Buffer_Overflow Function call argument is an uninitialized value
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_loop_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_loop_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_snprintf_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_snprintf_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_loop_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_loop_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_loop_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_loop_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_snprintf_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_snprintf_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_loop_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_loop_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_loop_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_loop_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_45_goodG2BData
CWE121_Stack_Based_Buffer_Overflow locals {dataGoodBuffer} escaping the scope of goodG2B through CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_68_goodG2BData
CWE121_Stack_Based_Buffer_Overflow Neither code nor specification for function alloca, generating default assigns from the prototype
CWE121_Stack_Based_Buffer_Overflow Neither code nor specification for function connect, generating default assigns from the prototype
CWE121_Stack_Based_Buffer_Overflow No code nor implicit assigns clause for function calloc, generating default assigns from the prototype
CWE121_Stack_Based_Buffer_Overflow Null pointer passed as an argument to a 'nonnull' parameter
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data + 0);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + i);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + i_0);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data_1 + i);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data + i);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data + i_0);
CWE121_Stack_Based_Buffer_Overflow out of bounds write. assert \valid(data + (int)(100 - 1));
CWE121_Stack_Based_Buffer_Overflow Possible null pointer dereference: data
CWE121_Stack_Based_Buffer_Overflow Same expression on both sides of '=='.
CWE121_Stack_Based_Buffer_Overflow Same expression on both sides of '!='.
CWE121_Stack_Based_Buffer_Overflow signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE121_Stack_Based_Buffer_Overflow signed overflow. assert tmp << 30 ≤ 2147483647;
CWE121_Stack_Based_Buffer_Overflow Size argument is greater than the free space in the destination buffer
CWE121_Stack_Based_Buffer_Overflow Size argument is greater than the length of the destination buffer
CWE121_Stack_Based_Buffer_Overflow Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE121_Stack_Based_Buffer_Overflow String copy function overflows destination buffer
CWE121_Stack_Based_Buffer_Overflow The scope of the variable 'buffer' can be reduced.
CWE121_Stack_Based_Buffer_Overflow The scope of the variable 'dataRef' can be reduced.
CWE121_Stack_Based_Buffer_Overflow The scope of the variable 'i' can be reduced.
CWE121_Stack_Based_Buffer_Overflow The scope of the variable 'recvResult' can be reduced.
CWE121_Stack_Based_Buffer_Overflow Uninitialized variable: data
CWE121_Stack_Based_Buffer_Overflow Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE121_Stack_Based_Buffer_Overflow Unused variable: dataBadBuffer
CWE121_Stack_Based_Buffer_Overflow Unused variable: dataBuffer
CWE121_Stack_Based_Buffer_Overflow Unused variable: dataGoodBuffer
CWE121_Stack_Based_Buffer_Overflow Value stored to 'dataBadBuffer' during its initialization is never read
CWE121_Stack_Based_Buffer_Overflow Value stored to 'data' during its initialization is never read
CWE121_Stack_Based_Buffer_Overflow Value stored to 'dataGoodBuffer' during its initialization is never read
CWE121_Stack_Based_Buffer_Overflow Value stored to 'data' is never read
CWE121_Stack_Based_Buffer_Overflow Variable 'dataBadBuffer' is assigned a value that is never used.
CWE121_Stack_Based_Buffer_Overflow Variable 'dataGoodBuffer' is assigned a value that is never used.
CWE121_Stack_Based_Buffer_Overflow Variable 'data' is assigned a value that is never used.
CWE121_Stack_Based_Buffer_Overflow Variable 'data' is not assigned a value.
CWE121_Stack_Based_Buffer_Overflow Variable 'data' is reassigned a value before the old one has been used.
CWE121_Stack_Based_Buffer_Overflow Variable 'dest' is assigned a value that is never used.
CWE122_Heap_Based_Buffer_Overflow accessing out of bounds index. assert i_0 < 50;
CWE122_Heap_Based_Buffer_Overflow accessing out of bounds index. assert i_0 < (int)(10 + 1);
CWE122_Heap_Based_Buffer_Overflow accessing out of bounds index. assert i < 50;
CWE122_Heap_Based_Buffer_Overflow accessing out of bounds index. assert i < (int)(10 + 1);
CWE122_Heap_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(&source[i]);
CWE122_Heap_Based_Buffer_Overflow accessing uninitialized left-value. assert \initialized(&source[i_0]);
CWE122_Heap_Based_Buffer_Overflow Array '[50]' accessed at index 99, which is out of bounds.
CWE122_Heap_Based_Buffer_Overflow Array access (from variable 'data') results in a null pointer dereference
CWE122_Heap_Based_Buffer_Overflow Array 'buffer[10]' accessed at index 10, which is out of bounds.
CWE122_Heap_Based_Buffer_Overflow Array 'data[10]' accessed at index 10, which is out of bounds.
CWE122_Heap_Based_Buffer_Overflow Array 'data[2]' accessed at index 9, which is out of bounds.
CWE122_Heap_Based_Buffer_Overflow Array 'data[50]' accessed at index 99, which is out of bounds.
CWE122_Heap_Based_Buffer_Overflow Assigned value is garbage or undefined
CWE122_Heap_Based_Buffer_Overflow Buffer is accessed out of bounds.
CWE122_Heap_Based_Buffer_Overflow Completely invalid destination for assigns
CWE122_Heap_Based_Buffer_Overflow Condition '5!=5' is always false
CWE122_Heap_Based_Buffer_Overflow Condition '5==5' is always true
CWE122_Heap_Based_Buffer_Overflow Condition 'data>=0' is always true
CWE122_Heap_Based_Buffer_Overflow Dereference of null pointer (loaded from variable 'data')
CWE122_Heap_Based_Buffer_Overflow Does not check for buffer overflows when concatenating to destination (CWE-120). Consider using strcat_s, strncat, or strlcat (warning, strncat is easily misused).
CWE122_Heap_Based_Buffer_Overflow Does not check for buffer overflows when copying to destination (CWE-120). Consider using strcpy_s, strncpy, or strlcpy (warning, strncpy is easily misused).
CWE122_Heap_Based_Buffer_Overflow Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE122_Heap_Based_Buffer_Overflow Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE122_Heap_Based_Buffer_Overflow Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE122_Heap_Based_Buffer_Overflow Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings.
CWE122_Heap_Based_Buffer_Overflow Floating-point constant 1.7E300 is not represented exactly. Will use 0x1.44ecd0d33972bp997. See documentation for option -warn-decimal-float
CWE122_Heap_Based_Buffer_Overflow Memory is allocated but not initialized: data
CWE122_Heap_Based_Buffer_Overflow Memory leak: data
CWE122_Heap_Based_Buffer_Overflow Memory leak: dataBadBuffer
CWE122_Heap_Based_Buffer_Overflow Memory leak: dataGoodBuffer
CWE122_Heap_Based_Buffer_Overflow Neither code nor specification for function connect, generating default assigns from the prototype
CWE122_Heap_Based_Buffer_Overflow No code nor implicit assigns clause for function calloc, generating default assigns from the prototype
CWE122_Heap_Based_Buffer_Overflow non-finite double value. assert \is_finite(*data);
CWE122_Heap_Based_Buffer_Overflow non-finite double value. assert \is_finite(*data_0);
CWE122_Heap_Based_Buffer_Overflow non-finite double value. assert \is_finite(*data_1);
CWE122_Heap_Based_Buffer_Overflow Null pointer passed as an argument to a 'nonnull' parameter
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data);
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data + 0);
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data_0 + 0);
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data_1 + 0);
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data + i);
CWE122_Heap_Based_Buffer_Overflow out of bounds read. assert \valid_read(data + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer_0 + data);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer_0 + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer + data);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer + data_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer + data_1);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer + i);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(buffer + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + 0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + 0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + i);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + (int)(100 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_0 + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(&data_0->intOne);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_1 + i);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data_1 + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(dataBadBuffer_0 + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(dataBadBuffer + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(dataGoodBuffer_0 + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(dataGoodBuffer + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + i);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + i_0);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + i_1);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + (int)(100 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(data + (int)(50 - 1));
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(&data->intOne);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(&structCharVoid_0->voidSecond);
CWE122_Heap_Based_Buffer_Overflow out of bounds write. assert \valid(&structCharVoid->voidSecond);
CWE122_Heap_Based_Buffer_Overflow pointer comparison. assert \pointer_comparable((void *)i_0, (void *)dataLen);
CWE122_Heap_Based_Buffer_Overflow pointer comparison. assert \pointer_comparable((void *)i, (void *)dataLen);
CWE122_Heap_Based_Buffer_Overflow Possible null pointer dereference: data
CWE122_Heap_Based_Buffer_Overflow Potential leak of memory pointed to by 'data'
CWE122_Heap_Based_Buffer_Overflow Potential leak of memory pointed to by 'dataBadBuffer'
CWE122_Heap_Based_Buffer_Overflow Potential leak of memory pointed to by 'dataGoodBuffer'
CWE122_Heap_Based_Buffer_Overflow Potential leak of memory pointed to by 'myUnion.unionFirst'
CWE122_Heap_Based_Buffer_Overflow Potential leak of memory pointed to by 'structCharVoid'
CWE122_Heap_Based_Buffer_Overflow Result of 'malloc' is converted to a pointer of type 'char', which is incompatible with sizeof operand type 'class OneIntClass'
CWE122_Heap_Based_Buffer_Overflow Result of 'malloc' is converted to a pointer of type 'char', which is incompatible with sizeof operand type 'class TwoIntsClass'
CWE122_Heap_Based_Buffer_Overflow Result of 'malloc' is converted to a pointer of type 'double', which is incompatible with sizeof operand type 'double *'
CWE122_Heap_Based_Buffer_Overflow Result of 'malloc' is converted to a pointer of type 'int64_t', which is incompatible with sizeof operand type 'int64_t *'
CWE122_Heap_Based_Buffer_Overflow Result of 'malloc' is converted to a pointer of type 'twoIntsStruct', which is incompatible with sizeof operand type 'twoIntsStruct *'
CWE122_Heap_Based_Buffer_Overflow Same expression on both sides of '=='.
CWE122_Heap_Based_Buffer_Overflow Same expression on both sides of '!='.
CWE122_Heap_Based_Buffer_Overflow signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE122_Heap_Based_Buffer_Overflow signed overflow. assert tmp << 30 ≤ 2147483647;
CWE122_Heap_Based_Buffer_Overflow Size argument is greater than the free space in the destination buffer
CWE122_Heap_Based_Buffer_Overflow Size argument is greater than the length of the destination buffer
CWE122_Heap_Based_Buffer_Overflow Size of pointer 'data' used instead of size of its data.
CWE122_Heap_Based_Buffer_Overflow Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE122_Heap_Based_Buffer_Overflow String copy function overflows destination buffer
CWE122_Heap_Based_Buffer_Overflow The allocated size 10 is not a multiple of the underlying type's size.
CWE122_Heap_Based_Buffer_Overflow The scope of the variable 'dataRef' can be reduced.
CWE122_Heap_Based_Buffer_Overflow The scope of the variable 'recvResult' can be reduced.
CWE122_Heap_Based_Buffer_Overflow Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE122_Heap_Based_Buffer_Overflow Value stored to 'dataBadBuffer' during its initialization is never read
CWE122_Heap_Based_Buffer_Overflow Value stored to 'data' during its initialization is never read
CWE122_Heap_Based_Buffer_Overflow Value stored to 'dataGoodBuffer' during its initialization is never read
CWE122_Heap_Based_Buffer_Overflow Value stored to 'data' is never read
CWE122_Heap_Based_Buffer_Overflow Variable 'dataBadBuffer' is assigned a value that is never used.
CWE122_Heap_Based_Buffer_Overflow Variable 'dataGoodBuffer' is assigned a value that is never used.
CWE122_Heap_Based_Buffer_Overflow Variable 'data' is assigned a value that is never used.
CWE122_Heap_Based_Buffer_Overflow Variable 'data' is not assigned a value.
CWE122_Heap_Based_Buffer_Overflow Variable 'data' is reassigned a value before the old one has been used.
CWE122_Heap_Based_Buffer_Overflow Variable 'dest' is assigned a value that is never used.
CWE123_Write_What_Where_Condition Address of stack memory associated with local variable 'head' is still referred to by the global variable 'linkedListNext' upon returning to the caller. This will be a dangling reference
CWE123_Write_What_Where_Condition Address of stack memory associated with local variable 'head' is still referred to by the global variable 'linkedListPrev' upon returning to the caller. This will be a dangling reference
CWE123_Write_What_Where_Condition Completely invalid destination for assigns
CWE123_Write_What_Where_Condition Condition '5!=5' is always false
CWE123_Write_What_Where_Condition Condition '5==5' is always true
CWE123_Write_What_Where_Condition Function parameter 'dataCopy' should be passed by reference.
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B1 through linkedListNext
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B1 through linkedListPrev
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B2 through linkedListNext
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B2 through linkedListPrev
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__connect_socket_45_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__connect_socket_68_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__fgets_45_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__fgets_68_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__listen_socket_45_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through CWE123_Write_What_Where_Condition__listen_socket_68_goodG2BData
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through linkedListNext
CWE123_Write_What_Where_Condition locals {head} escaping the scope of goodG2B through linkedListPrev
CWE123_Write_What_Where_Condition Neither code nor specification for function connect, generating default assigns from the prototype
CWE123_Write_What_Where_Condition out of bounds write. assert \valid(&linkedListNext->prev);
CWE123_Write_What_Where_Condition out of bounds write. assert \valid(&linkedListPrev->next);
CWE123_Write_What_Where_Condition Same expression on both sides of '=='.
CWE123_Write_What_Where_Condition Same expression on both sides of '!='.
CWE123_Write_What_Where_Condition The scope of the variable 'recvResult' can be reduced.
CWE123_Write_What_Where_Condition Variable 'data' is assigned in constructor body. Consider performing initialization in initialization list.
CWE124_Buffer_Underwrite accessing out of bounds index. assert 0 ≤ data;
CWE124_Buffer_Underwrite accessing out of bounds index. assert 0 ≤ data_0;
CWE124_Buffer_Underwrite accessing out of bounds index. assert 0 ≤ data_1;
CWE124_Buffer_Underwrite accessing out of bounds index. assert data_0 < 10;
CWE124_Buffer_Underwrite accessing out of bounds index. assert data < 10;
CWE124_Buffer_Underwrite accessing out of bounds index. assert data_1 < 10;
CWE124_Buffer_Underwrite accessing uninitialized left-value. assert \initialized(&data);
CWE124_Buffer_Underwrite accessing uninitialized left-value. assert \initialized(dataPtr1);
CWE124_Buffer_Underwrite accessing uninitialized left-value. assert \initialized(&source[i]);
CWE124_Buffer_Underwrite accessing uninitialized left-value. assert \initialized(&source[i_0]);
CWE124_Buffer_Underwrite all target addresses were invalid. This path is assumed to be dead.
CWE124_Buffer_Underwrite Array access (from variable 'data') results in a null pointer dereference
CWE124_Buffer_Underwrite Array index -5 is out of bounds.
CWE124_Buffer_Underwrite Assigned value is garbage or undefined
CWE124_Buffer_Underwrite Calling undeclared function alloca. Old style K&R code?
CWE124_Buffer_Underwrite Completely invalid destination for assigns
CWE124_Buffer_Underwrite Condition '5!=5' is always false
CWE124_Buffer_Underwrite Condition '5==5' is always true
CWE124_Buffer_Underwrite Condition 'data>=0' is always false
CWE124_Buffer_Underwrite Condition 'data<10' is always true
CWE124_Buffer_Underwrite Dereference of undefined pointer value
CWE124_Buffer_Underwrite Does not check for buffer overflows when copying to destination (CWE-120). Consider using strcpy_s, strncpy, or strlcpy (warning, strncpy is easily misused).
CWE124_Buffer_Underwrite Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE124_Buffer_Underwrite Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE124_Buffer_Underwrite Function call argument is an uninitialized value
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_cpy_45_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_cpy_68_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_loop_45_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_loop_68_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_memcpy_45_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_memcpy_68_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_memmove_45_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_memmove_68_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_ncpy_45_goodG2BData
CWE124_Buffer_Underwrite locals {dataBuffer} escaping the scope of goodG2B through CWE124_Buffer_Underwrite__char_declare_ncpy_68_goodG2BData
CWE124_Buffer_Underwrite Memory leak: dataBuffer
CWE124_Buffer_Underwrite Neither code nor specification for function alloca, generating default assigns from the prototype
CWE124_Buffer_Underwrite Neither code nor specification for function connect, generating default assigns from the prototype
CWE124_Buffer_Underwrite Null pointer passed as an argument to a 'nonnull' parameter
CWE124_Buffer_Underwrite out of bounds write. assert \valid(data_0 + i);
CWE124_Buffer_Underwrite out of bounds write. assert \valid(data_1 + i);
CWE124_Buffer_Underwrite out of bounds write. assert \valid(dataBuffer_0 + (int)(100 - 1));
CWE124_Buffer_Underwrite out of bounds write. assert \valid(dataBuffer + (int)(100 - 1));
CWE124_Buffer_Underwrite out of bounds write. assert \valid(data + i);
CWE124_Buffer_Underwrite out of bounds write. assert \valid(data + i_0);
CWE124_Buffer_Underwrite out of bounds write. assert \valid(data + (int)(100 - 1));
CWE124_Buffer_Underwrite Possible null pointer dereference: data
CWE124_Buffer_Underwrite Same expression on both sides of '=='.
CWE124_Buffer_Underwrite Same expression on both sides of '!='.
CWE124_Buffer_Underwrite signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE124_Buffer_Underwrite signed overflow. assert tmp << 30 ≤ 2147483647;
CWE124_Buffer_Underwrite Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE124_Buffer_Underwrite The scope of the variable 'buffer' can be reduced.
CWE124_Buffer_Underwrite The scope of the variable 'dataRef' can be reduced.
CWE124_Buffer_Underwrite The scope of the variable 'i' can be reduced.
CWE124_Buffer_Underwrite The scope of the variable 'recvResult' can be reduced.
CWE124_Buffer_Underwrite Undefined behaviour, pointer arithmetic 'dataBuffer-8' is out of bounds.
CWE124_Buffer_Underwrite Uninitialized variable: data
CWE124_Buffer_Underwrite Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE124_Buffer_Underwrite Value stored to 'data' during its initialization is never read
CWE124_Buffer_Underwrite Value stored to 'data' is never read
CWE124_Buffer_Underwrite Variable 'dataBuffer' is assigned a value that is never used.
CWE124_Buffer_Underwrite Variable 'data' is assigned a value that is never used.
CWE124_Buffer_Underwrite Variable 'data' is not assigned a value.
CWE124_Buffer_Underwrite Variable 'data' is reassigned a value before the old one has been used.
CWE126_Buffer_Overread accessing out of bounds index. assert data_0 < 10;
CWE126_Buffer_Overread accessing out of bounds index. assert data < 10;
CWE126_Buffer_Overread accessing out of bounds index. assert data_1 < 10;
CWE126_Buffer_Overread accessing out of bounds index. assert i_0 < 100;
CWE126_Buffer_Overread accessing out of bounds index. assert i < 100;
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(&data);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(data_0 + i);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(data + i);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(data + i_0);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(dataPtr1);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(&src_0[i_0]);
CWE126_Buffer_Overread accessing uninitialized left-value. assert \initialized(&src[i]);
CWE126_Buffer_Overread Array access (from variable 'data') results in a null pointer dereference
CWE126_Buffer_Overread Array 'buffer[10]' accessed at index 10, which is out of bounds.
CWE126_Buffer_Overread Assigned value is garbage or undefined
CWE126_Buffer_Overread Calling undeclared function alloca. Old style K&R code?
CWE126_Buffer_Overread Completely invalid destination for assigns
CWE126_Buffer_Overread Condition '5!=5' is always false
CWE126_Buffer_Overread Condition '5==5' is always true
CWE126_Buffer_Overread Condition 'data>=0' is always true
CWE126_Buffer_Overread Dereference of undefined pointer value
CWE126_Buffer_Overread Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE126_Buffer_Overread Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE126_Buffer_Overread Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE126_Buffer_Overread Function call argument is an uninitialized value
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_loop_45_goodG2BData
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_loop_68_goodG2BData
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_memcpy_45_goodG2BData
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_memcpy_68_goodG2BData
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_memmove_45_goodG2BData
CWE126_Buffer_Overread locals {dataGoodBuffer} escaping the scope of goodG2B through CWE126_Buffer_Overread__char_declare_memmove_68_goodG2BData
CWE126_Buffer_Overread Neither code nor specification for function alloca, generating default assigns from the prototype
CWE126_Buffer_Overread Neither code nor specification for function connect, generating default assigns from the prototype
CWE126_Buffer_Overread Null pointer passed as an argument to a 'nonnull' parameter
CWE126_Buffer_Overread out of bounds read. assert \valid_read(data_0 + i);
CWE126_Buffer_Overread out of bounds read. assert \valid_read(data + i);
CWE126_Buffer_Overread out of bounds read. assert \valid_read(data + i_0);
CWE126_Buffer_Overread out of bounds write. assert \valid(data_0 + (int)(100 - 1));
CWE126_Buffer_Overread out of bounds write. assert \valid(data_0 + (int)(50 - 1));
CWE126_Buffer_Overread out of bounds write. assert \valid(data + (int)(100 - 1));
CWE126_Buffer_Overread out of bounds write. assert \valid(data + (int)(50 - 1));
CWE126_Buffer_Overread Possible null pointer dereference: data
CWE126_Buffer_Overread Same expression on both sides of '=='.
CWE126_Buffer_Overread Same expression on both sides of '!='.
CWE126_Buffer_Overread signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE126_Buffer_Overread signed overflow. assert tmp << 30 ≤ 2147483647;
CWE126_Buffer_Overread Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE126_Buffer_Overread The scope of the variable 'buffer' can be reduced.
CWE126_Buffer_Overread The scope of the variable 'dataRef' can be reduced.
CWE126_Buffer_Overread The scope of the variable 'recvResult' can be reduced.
CWE126_Buffer_Overread Uninitialized variable: data
CWE126_Buffer_Overread Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE126_Buffer_Overread Value stored to 'data' during its initialization is never read
CWE126_Buffer_Overread Value stored to 'data' is never read
CWE126_Buffer_Overread Variable 'dataBadBuffer' is assigned a value that is never used.
CWE126_Buffer_Overread Variable 'dataGoodBuffer' is assigned a value that is never used.
CWE126_Buffer_Overread Variable 'data' is assigned a value that is never used.
CWE126_Buffer_Overread Variable 'data' is not assigned a value.
CWE126_Buffer_Overread Variable 'data' is reassigned a value before the old one has been used.
CWE127_Buffer_Underread accessing out of bounds index. assert 0 ≤ data;
CWE127_Buffer_Underread accessing out of bounds index. assert 0 ≤ data_0;
CWE127_Buffer_Underread accessing out of bounds index. assert 0 ≤ data_1;
CWE127_Buffer_Underread accessing out of bounds index. assert data_0 < 10;
CWE127_Buffer_Underread accessing out of bounds index. assert data < 10;
CWE127_Buffer_Underread accessing out of bounds index. assert data_1 < 10;
CWE127_Buffer_Underread accessing uninitialized left-value. assert \initialized(&data);
CWE127_Buffer_Underread accessing uninitialized left-value. assert \initialized(data_0 + i);
CWE127_Buffer_Underread accessing uninitialized left-value. assert \initialized(data + i);
CWE127_Buffer_Underread accessing uninitialized left-value. assert \initialized(dataPtr1);
CWE127_Buffer_Underread Array access (from variable 'data') results in a null pointer dereference
CWE127_Buffer_Underread Array index -5 is out of bounds.
CWE127_Buffer_Underread Assigned value is garbage or undefined
CWE127_Buffer_Underread Calling undeclared function alloca. Old style K&R code?
CWE127_Buffer_Underread Completely invalid destination for assigns
CWE127_Buffer_Underread Condition '5!=5' is always false
CWE127_Buffer_Underread Condition '5==5' is always true
CWE127_Buffer_Underread Condition 'data>=0' is always false
CWE127_Buffer_Underread Condition 'data<10' is always true
CWE127_Buffer_Underread Dereference of undefined pointer value
CWE127_Buffer_Underread Does not check for buffer overflows when copying to destination (CWE-120). Consider using strcpy_s, strncpy, or strlcpy (warning, strncpy is easily misused).
CWE127_Buffer_Underread Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE127_Buffer_Underread Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE127_Buffer_Underread Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE127_Buffer_Underread Function call argument is an uninitialized value
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_cpy_45_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_cpy_68_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_loop_45_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_loop_68_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_memcpy_45_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_memcpy_68_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_memmove_45_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_memmove_68_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_ncpy_45_goodG2BData
CWE127_Buffer_Underread locals {dataBuffer} escaping the scope of goodG2B through CWE127_Buffer_Underread__char_declare_ncpy_68_goodG2BData
CWE127_Buffer_Underread Memory leak: dataBuffer
CWE127_Buffer_Underread Neither code nor specification for function alloca, generating default assigns from the prototype
CWE127_Buffer_Underread Neither code nor specification for function connect, generating default assigns from the prototype
CWE127_Buffer_Underread Null pointer passed as an argument to a 'nonnull' parameter
CWE127_Buffer_Underread out of bounds read. assert \valid_read(data_0 + i);
CWE127_Buffer_Underread out of bounds read. assert \valid_read(data_1 + i);
CWE127_Buffer_Underread out of bounds read. assert \valid_read(data + i);
CWE127_Buffer_Underread out of bounds read. assert \valid_read(data + i_0);
CWE127_Buffer_Underread out of bounds write. assert \valid(dataBuffer_0 + (int)(100 - 1));
CWE127_Buffer_Underread out of bounds write. assert \valid(dataBuffer + (int)(100 - 1));
CWE127_Buffer_Underread Possible null pointer dereference: data
CWE127_Buffer_Underread Same expression on both sides of '=='.
CWE127_Buffer_Underread Same expression on both sides of '!='.
CWE127_Buffer_Underread signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE127_Buffer_Underread signed overflow. assert tmp << 30 ≤ 2147483647;
CWE127_Buffer_Underread Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE127_Buffer_Underread The scope of the variable 'buffer' can be reduced.
CWE127_Buffer_Underread The scope of the variable 'dataRef' can be reduced.
CWE127_Buffer_Underread The scope of the variable 'recvResult' can be reduced.
CWE127_Buffer_Underread Undefined behaviour, pointer arithmetic 'dataBuffer-8' is out of bounds.
CWE127_Buffer_Underread Uninitialized variable: data
CWE127_Buffer_Underread Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE127_Buffer_Underread Value stored to 'data' during its initialization is never read
CWE127_Buffer_Underread Value stored to 'data' is never read
CWE127_Buffer_Underread Variable 'dataBuffer' is assigned a value that is never used.
CWE127_Buffer_Underread Variable 'data' is assigned a value that is never used.
CWE127_Buffer_Underread Variable 'data' is not assigned a value.
CWE127_Buffer_Underread Variable 'data' is reassigned a value before the old one has been used.
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_printf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_printf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_connect_socket_printf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_fprintf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_fprintf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_fprintf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_printf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_printf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_console_printf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_fprintf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_fprintf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_fprintf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_printf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_printf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_environment_printf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_fprintf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_fprintf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_fprintf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_printf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_printf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_file_printf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_printf_45_badData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_printf_45_goodB2GData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'CWE134_Uncontrolled_Format_String__char_listen_socket_printf_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE134_Uncontrolled_Format_String Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362).
CWE134_Uncontrolled_Format_String Completely invalid destination for assigns
CWE134_Uncontrolled_Format_String Condition '5!=5' is always false
CWE134_Uncontrolled_Format_String Condition '5==5' is always true
CWE134_Uncontrolled_Format_String Does not check for buffer overflows when copying to destination (CWE-120). Consider using strcpy_s, strncpy, or strlcpy (warning, strncpy is easily misused). Risk is low because the source is a constant string.
CWE134_Uncontrolled_Format_String Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE134_Uncontrolled_Format_String Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings.
CWE134_Uncontrolled_Format_String If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification.
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_printf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_printf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_fprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_fprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_printf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_printf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_snprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_snprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_vfprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_vfprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_vprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_console_vprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_fprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_fprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_printf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_printf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_snprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_snprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_vfprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_vfprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_vprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_environment_vprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_fprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_fprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_printf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_printf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_snprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_snprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_vfprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_vfprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_vprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_file_vprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_printf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_printf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_snprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_snprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_45_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodB2G through CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_68_goodB2GData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_printf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_printf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_fprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_fprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_printf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_printf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_snprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_snprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_vfprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_vfprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_vprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_console_vprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_fprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_fprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_printf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_printf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_snprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_snprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_vfprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_vfprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_vprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_environment_vprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_fprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_fprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_printf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_printf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_snprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_snprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_vfprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_vfprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_vprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_file_vprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_printf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_printf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_snprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_snprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_45_goodG2BData
CWE134_Uncontrolled_Format_String locals {dataBuffer} escaping the scope of goodG2B through CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_68_goodG2BData
CWE134_Uncontrolled_Format_String Neither code nor specification for function __builtin_va_end, generating default assigns from the prototype
CWE134_Uncontrolled_Format_String Neither code nor specification for function __builtin_va_start, generating default assigns from the prototype
CWE134_Uncontrolled_Format_String Neither code nor specification for function connect, generating default assigns from the prototype
CWE134_Uncontrolled_Format_String out of bounds read. assert \valid_read(data_0 + (unsigned int)(dataLen - 1));
CWE134_Uncontrolled_Format_String out of bounds read. assert \valid_read(data + (unsigned int)(dataLen_0 - 1));
CWE134_Uncontrolled_Format_String out of bounds read. assert \valid_read(data + (unsigned int)(dataLen - 1));
CWE134_Uncontrolled_Format_String out of bounds write.
CWE134_Uncontrolled_Format_String out of bounds write. assert \valid(data_0 + dataLen);
CWE134_Uncontrolled_Format_String out of bounds write. assert \valid(data + dataLen);
CWE134_Uncontrolled_Format_String out of bounds write. assert \valid(data + dataLen_0);
CWE134_Uncontrolled_Format_String out of bounds write. assert \valid(replace);
CWE134_Uncontrolled_Format_String out of bounds write. assert \valid(replace_0);
CWE134_Uncontrolled_Format_String pointer comparison.
CWE134_Uncontrolled_Format_String pointer comparison. assert \pointer_comparable((void *)0, (void *)replace);
CWE134_Uncontrolled_Format_String pointer comparison. assert \pointer_comparable((void *)0, (void *)replace_0);
CWE134_Uncontrolled_Format_String Same expression on both sides of '=='.
CWE134_Uncontrolled_Format_String Same expression on both sides of '!='.
CWE134_Uncontrolled_Format_String Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE134_Uncontrolled_Format_String The function 'goodB2GVaSinkB' is never used.
CWE134_Uncontrolled_Format_String The function 'goodG2BVaSinkG' is never used.
CWE134_Uncontrolled_Format_String The scope of the variable 'pFile' can be reduced.
CWE134_Uncontrolled_Format_String The scope of the variable 'recvResult' can be reduced.
CWE134_Uncontrolled_Format_String The scope of the variable 'replace' can be reduced.
CWE134_Uncontrolled_Format_String Variable 'dataBuffer' is assigned a value that is never used.
CWE134_Uncontrolled_Format_String Variable 'data' is assigned a value that is never used.
CWE188_Reliance_on_Data_Memory_Layout Condition '5!=5' is always false
CWE188_Reliance_on_Data_Memory_Layout Condition '5==5' is always true
CWE188_Reliance_on_Data_Memory_Layout Same expression on both sides of '=='.
CWE188_Reliance_on_Data_Memory_Layout Same expression on both sides of '!='.
CWE188_Reliance_on_Data_Memory_Layout struct member 'Anonymous1::charFirst' is never used.
CWE188_Reliance_on_Data_Memory_Layout struct member 'Anonymous1::charSecond' is never used.
CWE188_Reliance_on_Data_Memory_Layout struct member 'Anonymous1::charThird' is never used.
CWE190_Integer_Overflow Completely invalid destination for assigns
CWE190_Integer_Overflow Condition '5!=5' is always false
CWE190_Integer_Overflow Condition '5==5' is always true
CWE190_Integer_Overflow Condition 'data>0' is always true
CWE190_Integer_Overflow %lld in format string (no. 1) requires 'long long *' but the argument type is 'signed long *'.
CWE190_Integer_Overflow Neither code nor specification for function connect, generating default assigns from the prototype
CWE190_Integer_Overflow non-finite double value.
CWE190_Integer_Overflow overflow in conversion from floating-point to integer.
CWE190_Integer_Overflow Same expression on both sides of '=='.
CWE190_Integer_Overflow Same expression on both sides of '!='.
CWE190_Integer_Overflow signed overflow.
CWE190_Integer_Overflow signed overflow. assert -2147483648 ≤ data_0 * data_0;
CWE190_Integer_Overflow signed overflow. assert -2147483648 ≤ data_1 * data_1;
CWE190_Integer_Overflow signed overflow. assert -2147483648 ≤ data * data;
CWE190_Integer_Overflow signed overflow. assert data_0 + 1 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_0 * 2 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_0 * data_0 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_0 * data_0 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data_0 + (long long)1 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data_0 * (long long)2 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data_1 + 1 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data + 1 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_1 * 2 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_1 * data_1 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data_1 * data_1 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data_1 + (long long)1 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data_1 * (long long)2 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data * 2 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data * data ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert data * data ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data + (long long)1 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert data * (long long)2 ≤ 9223372036854775807;
CWE190_Integer_Overflow signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE190_Integer_Overflow signed overflow. assert tmp << 30 ≤ 2147483647;
CWE190_Integer_Overflow Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE190_Integer_Overflow The scope of the variable 'dataRef' can be reduced.
CWE190_Integer_Overflow The scope of the variable 'recvResult' can be reduced.
CWE190_Integer_Overflow Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE190_Integer_Overflow Value stored to 'data' during its initialization is never read
CWE190_Integer_Overflow Value stored to 'data' is never read
CWE190_Integer_Overflow Variable 'data' is assigned a value that is never used.
CWE190_Integer_Overflow Variable 'data' is reassigned a value before the old one has been used.
CWE191_Integer_Underflow Completely invalid destination for assigns
CWE191_Integer_Underflow Condition '5!=5' is always false
CWE191_Integer_Underflow Condition '5==5' is always true
CWE191_Integer_Underflow Condition 'data>0' is always false
CWE191_Integer_Underflow Condition 'data<0' is always true
CWE191_Integer_Underflow %lld in format string (no. 1) requires 'long long *' but the argument type is 'signed long *'.
CWE191_Integer_Underflow Neither code nor specification for function connect, generating default assigns from the prototype
CWE191_Integer_Underflow Same expression on both sides of '=='.
CWE191_Integer_Underflow Same expression on both sides of '!='.
CWE191_Integer_Underflow signed overflow.
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data_0 - 1;
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data_0 * 2;
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data - 1;
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data_1 - 1;
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data_1 * 2;
CWE191_Integer_Underflow signed overflow. assert -2147483648 ≤ data * 2;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data_0 - (long long)1;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data_0 * (long long)2;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data_1 - (long long)1;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data_1 * (long long)2;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data - (long long)1;
CWE191_Integer_Underflow signed overflow. assert -9223372036854775808 ≤ data * (long long)2;
CWE191_Integer_Underflow signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE191_Integer_Underflow signed overflow. assert tmp << 30 ≤ 2147483647;
CWE191_Integer_Underflow Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE191_Integer_Underflow The scope of the variable 'dataRef' can be reduced.
CWE191_Integer_Underflow The scope of the variable 'recvResult' can be reduced.
CWE191_Integer_Underflow Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE191_Integer_Underflow Value stored to 'data' during its initialization is never read
CWE191_Integer_Underflow Value stored to 'data' is never read
CWE191_Integer_Underflow Variable 'data' is assigned a value that is never used.
CWE191_Integer_Underflow Variable 'data' is reassigned a value before the old one has been used.
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert 0 ≤ data;
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert 0 ≤ data_0;
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert 0 ≤ data_1;
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert data_0 < 100;
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert data < 100;
CWE194_Unexpected_Sign_Extension accessing out of bounds index. assert data_1 < 100;
CWE194_Unexpected_Sign_Extension Array index -1 is out of bounds.
CWE194_Unexpected_Sign_Extension Call to 'malloc' has an allocation size of 0 bytes
CWE194_Unexpected_Sign_Extension Completely invalid destination for assigns
CWE194_Unexpected_Sign_Extension Condition '5!=5' is always false
CWE194_Unexpected_Sign_Extension Condition '5==5' is always true
CWE194_Unexpected_Sign_Extension Condition 'data<100' is always true
CWE194_Unexpected_Sign_Extension Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE194_Unexpected_Sign_Extension Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE194_Unexpected_Sign_Extension Invalid malloc() argument nr 1. The value is -1 but the valid values are '0:'.
CWE194_Unexpected_Sign_Extension Invalid memcpy() argument nr 3. The value is -1 but the valid values are '0:'.
CWE194_Unexpected_Sign_Extension Invalid memmove() argument nr 3. The value is -1 but the valid values are '0:'.
CWE194_Unexpected_Sign_Extension Invalid memset() argument nr 3. The value is -2 but the valid values are '0:'.
CWE194_Unexpected_Sign_Extension Invalid strncpy() argument nr 3. The value is -1 but the valid values are '0:'.
CWE194_Unexpected_Sign_Extension Memory allocation size is negative.
CWE194_Unexpected_Sign_Extension Neither code nor specification for function connect, generating default assigns from the prototype
CWE194_Unexpected_Sign_Extension out of bounds write. assert \valid(dataBuffer + (int)((int)data_0 - 1));
CWE194_Unexpected_Sign_Extension out of bounds write. assert \valid(dataBuffer + (int)((int)data - 1));
CWE194_Unexpected_Sign_Extension out of bounds write. assert \valid(dataBuffer + (int)((int)data_1 - 1));
CWE194_Unexpected_Sign_Extension Same expression on both sides of '=='.
CWE194_Unexpected_Sign_Extension Same expression on both sides of '!='.
CWE194_Unexpected_Sign_Extension signed overflow. assert tmp << 30 ≤ 2147483647;
CWE194_Unexpected_Sign_Extension Size argument is greater than the length of the destination buffer
CWE194_Unexpected_Sign_Extension Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE194_Unexpected_Sign_Extension The scope of the variable 'dataRef' can be reduced.
CWE194_Unexpected_Sign_Extension The scope of the variable 'recvResult' can be reduced.
CWE194_Unexpected_Sign_Extension The scope of the variable 'tempInt' can be reduced.
CWE194_Unexpected_Sign_Extension Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE194_Unexpected_Sign_Extension Value stored to 'data' during its initialization is never read
CWE194_Unexpected_Sign_Extension Value stored to 'data' is never read
CWE194_Unexpected_Sign_Extension Variable 'data' is assigned a value that is never used.
CWE194_Unexpected_Sign_Extension Variable 'data' is reassigned a value before the old one has been used.
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert 0 ≤ data;
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert 0 ≤ data_0;
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert 0 ≤ data_1;
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert data_0 < 100;
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert data < 100;
CWE195_Signed_to_Unsigned_Conversion_Error accessing out of bounds index. assert data_1 < 100;
CWE195_Signed_to_Unsigned_Conversion_Error Array index -1 is out of bounds.
CWE195_Signed_to_Unsigned_Conversion_Error Completely invalid destination for assigns
CWE195_Signed_to_Unsigned_Conversion_Error Condition '5!=5' is always false
CWE195_Signed_to_Unsigned_Conversion_Error Condition '5==5' is always true
CWE195_Signed_to_Unsigned_Conversion_Error Condition 'data<100' is always true
CWE195_Signed_to_Unsigned_Conversion_Error Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data.
CWE195_Signed_to_Unsigned_Conversion_Error Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers (CWE-120).
CWE195_Signed_to_Unsigned_Conversion_Error Invalid malloc() argument nr 1. The value is -1 but the valid values are '0:'.
CWE195_Signed_to_Unsigned_Conversion_Error Invalid memcpy() argument nr 3. The value is -1 but the valid values are '0:'.
CWE195_Signed_to_Unsigned_Conversion_Error Invalid memmove() argument nr 3. The value is -1 but the valid values are '0:'.
CWE195_Signed_to_Unsigned_Conversion_Error Invalid memset() argument nr 3. The value is -2 but the valid values are '0:'.
CWE195_Signed_to_Unsigned_Conversion_Error Invalid strncpy() argument nr 3. The value is -1 but the valid values are '0:'.
CWE195_Signed_to_Unsigned_Conversion_Error Memory allocation size is negative.
CWE195_Signed_to_Unsigned_Conversion_Error Neither code nor specification for function connect, generating default assigns from the prototype
CWE195_Signed_to_Unsigned_Conversion_Error out of bounds write. assert \valid(dataBuffer + (int)(data_0 - 1));
CWE195_Signed_to_Unsigned_Conversion_Error out of bounds write. assert \valid(dataBuffer + (int)(data - 1));
CWE195_Signed_to_Unsigned_Conversion_Error out of bounds write. assert \valid(dataBuffer + (int)(data_1 - 1));
CWE195_Signed_to_Unsigned_Conversion_Error Same expression on both sides of '=='.
CWE195_Signed_to_Unsigned_Conversion_Error Same expression on both sides of '!='.
CWE195_Signed_to_Unsigned_Conversion_Error signed overflow. assert -2147483648 ≤ data_0 - 1;
CWE195_Signed_to_Unsigned_Conversion_Error signed overflow. assert -2147483648 ≤ data - 1;
CWE195_Signed_to_Unsigned_Conversion_Error signed overflow. assert -2147483648 ≤ data_1 - 1;
CWE195_Signed_to_Unsigned_Conversion_Error signed overflow. assert tmp << 30 ≤ 2147483647;
CWE195_Signed_to_Unsigned_Conversion_Error Size argument is greater than the length of the destination buffer
CWE195_Signed_to_Unsigned_Conversion_Error Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE195_Signed_to_Unsigned_Conversion_Error The scope of the variable 'dataRef' can be reduced.
CWE195_Signed_to_Unsigned_Conversion_Error The scope of the variable 'recvResult' can be reduced.
CWE195_Signed_to_Unsigned_Conversion_Error Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE195_Signed_to_Unsigned_Conversion_Error Value stored to 'data' during its initialization is never read
CWE195_Signed_to_Unsigned_Conversion_Error Value stored to 'data' is never read
CWE195_Signed_to_Unsigned_Conversion_Error Variable 'data' is assigned a value that is never used.
CWE195_Signed_to_Unsigned_Conversion_Error Variable 'data' is reassigned a value before the old one has been used.
CWE196_Unsigned_to_Signed_Conversion_Error Condition '5!=5' is always false
CWE196_Unsigned_to_Signed_Conversion_Error Condition '5==5' is always true
CWE196_Unsigned_to_Signed_Conversion_Error Same expression on both sides of '=='.
CWE196_Unsigned_to_Signed_Conversion_Error Same expression on both sides of '!='.
CWE197_Numeric_Truncation_Error Completely invalid destination for assigns
CWE197_Numeric_Truncation_Error Condition '5!=5' is always false
CWE197_Numeric_Truncation_Error Condition '5==5' is always true
CWE197_Numeric_Truncation_Error Neither code nor specification for function connect, generating default assigns from the prototype
CWE197_Numeric_Truncation_Error Same expression on both sides of '=='.
CWE197_Numeric_Truncation_Error Same expression on both sides of '!='.
CWE197_Numeric_Truncation_Error signed overflow. assert tmp << 30 ≤ 2147483647;
CWE197_Numeric_Truncation_Error Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE197_Numeric_Truncation_Error The scope of the variable 'dataRef' can be reduced.
CWE197_Numeric_Truncation_Error The scope of the variable 'recvResult' can be reduced.
CWE197_Numeric_Truncation_Error Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE197_Numeric_Truncation_Error Value stored to 'data' during its initialization is never read
CWE197_Numeric_Truncation_Error Value stored to 'data' is never read
CWE197_Numeric_Truncation_Error Variable 'data' is assigned a value that is never used.
CWE197_Numeric_Truncation_Error Variable 'data' is reassigned a value before the old one has been used.
CWE23_Relative_Path_Traversal Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'badData' upon returning to the caller. This will be a dangling reference
CWE23_Relative_Path_Traversal Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'goodG2BData' upon returning to the caller. This will be a dangling reference
CWE23_Relative_Path_Traversal Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362).
CWE23_Relative_Path_Traversal Condition '5!=5' is always false
CWE23_Relative_Path_Traversal Condition '5==5' is always true
CWE23_Relative_Path_Traversal Does not check for buffer overflows when concatenating to destination (CWE-120). Consider using strcat_s, strncat, or strlcat (warning, strncat is easily misused). Risk is low because the source is a constant string.
CWE23_Relative_Path_Traversal Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE23_Relative_Path_Traversal Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings.
CWE23_Relative_Path_Traversal Same expression on both sides of '=='.
CWE23_Relative_Path_Traversal Same expression on both sides of '!='.
CWE23_Relative_Path_Traversal Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE23_Relative_Path_Traversal The scope of the variable 'pFile' can be reduced.
CWE23_Relative_Path_Traversal The scope of the variable 'recvResult' can be reduced.
CWE23_Relative_Path_Traversal The scope of the variable 'replace' can be reduced.
CWE23_Relative_Path_Traversal Variable 'dataBuffer' is assigned a value that is never used.
CWE23_Relative_Path_Traversal Variable 'data' is assigned a value that is never used.
CWE23_Relative_Path_Traversal Variable 'pFile' is reassigned a value before the old one has been used.
CWE242_Use_of_Inherently_Dangerous_Function Condition '5!=5' is always false
CWE242_Use_of_Inherently_Dangerous_Function Condition '5==5' is always true
CWE242_Use_of_Inherently_Dangerous_Function Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
CWE242_Use_of_Inherently_Dangerous_Function Obsolete function 'gets' called. It is recommended to use 'fgets' or 'gets_s' instead.
CWE242_Use_of_Inherently_Dangerous_Function Same expression on both sides of '=='.
CWE242_Use_of_Inherently_Dangerous_Function Same expression on both sides of '!='.
CWE242_Use_of_Inherently_Dangerous_Function Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE252_Unchecked_Return_Value Condition '5!=5' is always false
CWE252_Unchecked_Return_Value Condition '5==5' is always true
CWE252_Unchecked_Return_Value Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE252_Unchecked_Return_Value It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function.
CWE252_Unchecked_Return_Value Neither code nor specification for function sscanf, generating default assigns from the prototype
CWE252_Unchecked_Return_Value Same expression on both sides of '=='.
CWE252_Unchecked_Return_Value Same expression on both sides of '!='.
CWE252_Unchecked_Return_Value Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE253_Incorrect_Check_of_Function_Return_Value Condition '5!=5' is always false
CWE253_Incorrect_Check_of_Function_Return_Value Condition '5==5' is always true
CWE253_Incorrect_Check_of_Function_Return_Value Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE253_Incorrect_Check_of_Function_Return_Value It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function.
CWE253_Incorrect_Check_of_Function_Return_Value Neither code nor specification for function sscanf, generating default assigns from the prototype
CWE253_Incorrect_Check_of_Function_Return_Value pointer comparison.
CWE253_Incorrect_Check_of_Function_Return_Value Same expression on both sides of '=='.
CWE253_Incorrect_Check_of_Function_Return_Value Same expression on both sides of '!='.
CWE253_Incorrect_Check_of_Function_Return_Value Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE364_Signal_Handler_Race_Condition Condition '5!=5' is always false
CWE364_Signal_Handler_Race_Condition Condition '5==5' is always true
CWE364_Signal_Handler_Race_Condition out of bounds write.
CWE364_Signal_Handler_Race_Condition Same expression on both sides of '=='.
CWE364_Signal_Handler_Race_Condition Same expression on both sides of '!='.
CWE366_Race_Condition_Within_Thread Completely invalid destination for assigns clause *((char *)args + (0 ..)).
CWE366_Race_Condition_Within_Thread Completely invalid destination for assigns clause *lock. Ignoring.
CWE366_Race_Condition_Within_Thread Completely invalid destination for assigns clause *start. Ignoring.
CWE366_Race_Condition_Within_Thread Condition '5!=5' is always false
CWE366_Race_Condition_Within_Thread Condition '5==5' is always true
CWE366_Race_Condition_Within_Thread Neither code nor specification for function stdThreadCreate, generating default assigns from the prototype
CWE366_Race_Condition_Within_Thread Neither code nor specification for function stdThreadLockCreate, generating default assigns from the prototype
CWE366_Race_Condition_Within_Thread Neither code nor specification for function stdThreadLockDestroy, generating default assigns from the prototype
CWE366_Race_Condition_Within_Thread Same expression on both sides of '=='.
CWE366_Race_Condition_Within_Thread Same expression on both sides of '!='.
CWE367_TOC_TOU accessing out of bounds index.
CWE367_TOC_TOU Condition '5!=5' is always false
CWE367_TOC_TOU Condition '5==5' is always true
CWE367_TOC_TOU Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE367_TOC_TOU Neither code nor specification for function access, generating default assigns from the prototype
CWE367_TOC_TOU Neither code nor specification for function stat, generating default assigns from the prototype
CWE367_TOC_TOU Same expression on both sides of '=='.
CWE367_TOC_TOU Same expression on both sides of '!='.
CWE367_TOC_TOU Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE369_Divide_by_Zero Completely invalid destination for assigns
CWE369_Divide_by_Zero Condition '5!=5' is always false
CWE369_Divide_by_Zero Condition '5==5' is always true
CWE369_Divide_by_Zero Condition 'data!=0' is always false
CWE369_Divide_by_Zero Division by zero
CWE369_Divide_by_Zero Division by zero.
CWE369_Divide_by_Zero division by zero. assert data ≢ 0;
CWE369_Divide_by_Zero division by zero. assert data_0 ≢ 0;
CWE369_Divide_by_Zero division by zero. assert data_1 ≢ 0;
CWE369_Divide_by_Zero Floating-point constant 0.000001 is not represented exactly. Will use 0x1.0c6f7a0b5ed8dp-20. See documentation for option -warn-decimal-float
CWE369_Divide_by_Zero Neither code nor specification for function connect, generating default assigns from the prototype
CWE369_Divide_by_Zero Neither code nor specification for function fabs, generating default assigns from the prototype
CWE369_Divide_by_Zero non-finite double value.
CWE369_Divide_by_Zero non-finite double value. assert \is_finite((double)(100.0 / (double)data));
CWE369_Divide_by_Zero non-finite double value. assert \is_finite((double)(100.0 / (double)data_0));
CWE369_Divide_by_Zero non-finite double value. assert \is_finite((double)(100.0 / (double)data_1));
CWE369_Divide_by_Zero non-finite float value.
CWE369_Divide_by_Zero overflow in conversion from floating-point to integer.
CWE369_Divide_by_Zero Same expression on both sides of '=='.
CWE369_Divide_by_Zero Same expression on both sides of '!='.
CWE369_Divide_by_Zero signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE369_Divide_by_Zero signed overflow. assert tmp << 30 ≤ 2147483647;
CWE369_Divide_by_Zero Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE369_Divide_by_Zero The scope of the variable 'dataRef' can be reduced.
CWE369_Divide_by_Zero The scope of the variable 'recvResult' can be reduced.
CWE369_Divide_by_Zero Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE369_Divide_by_Zero Value stored to 'data' during its initialization is never read
CWE369_Divide_by_Zero Value stored to 'data' is never read
CWE369_Divide_by_Zero Variable 'data' is assigned a value that is never used.
CWE369_Divide_by_Zero Variable 'data' is reassigned a value before the old one has been used.
CWE36_Absolute_Path_Traversal Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'badData' upon returning to the caller. This will be a dangling reference
CWE36_Absolute_Path_Traversal Address of stack memory associated with local variable 'dataBuffer' is still referred to by the global variable 'goodG2BData' upon returning to the caller. This will be a dangling reference
CWE36_Absolute_Path_Traversal Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362).
CWE36_Absolute_Path_Traversal Condition '5!=5' is always false
CWE36_Absolute_Path_Traversal Condition '5==5' is always true
CWE36_Absolute_Path_Traversal Does not check for buffer overflows when concatenating to destination (CWE-120). Consider using strcat_s, strncat, or strlcat (warning, strncat is easily misused). Risk is low because the source is a constant string.
CWE36_Absolute_Path_Traversal Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE36_Absolute_Path_Traversal Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings.
CWE36_Absolute_Path_Traversal Same expression on both sides of '=='.
CWE36_Absolute_Path_Traversal Same expression on both sides of '!='.
CWE36_Absolute_Path_Traversal Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE36_Absolute_Path_Traversal The scope of the variable 'pFile' can be reduced.
CWE36_Absolute_Path_Traversal The scope of the variable 'recvResult' can be reduced.
CWE36_Absolute_Path_Traversal The scope of the variable 'replace' can be reduced.
CWE36_Absolute_Path_Traversal Variable 'dataBuffer' is assigned a value that is never used.
CWE36_Absolute_Path_Traversal Variable 'data' is assigned a value that is never used.
CWE36_Absolute_Path_Traversal Variable 'pFile' is reassigned a value before the old one has been used.
CWE377_Insecure_Temporary_File Calling undeclared function mktemp. Old style K&R code?
CWE377_Insecure_Temporary_File Calling undeclared function tempnam. Old style K&R code?
CWE377_Insecure_Temporary_File Call to function 'mktemp' is insecure as it always creates or uses insecure temporary file. Use 'mkstemp' instead
CWE377_Insecure_Temporary_File Completely invalid destination for assigns clause *((char *)x_0 + (0 ..)).
CWE377_Insecure_Temporary_File Completely invalid destination for assigns clause *((char *)x_1 + (0 ..)).
CWE377_Insecure_Temporary_File Completely invalid destination for assigns clause *(s + (..)). Ignoring.
CWE377_Insecure_Temporary_File Condition '5!=5' is always false
CWE377_Insecure_Temporary_File Condition '5==5' is always true
CWE377_Insecure_Temporary_File Neither code nor specification for function mktemp, generating default assigns from the prototype
CWE377_Insecure_Temporary_File Neither code nor specification for function tempnam, generating default assigns from the prototype
CWE377_Insecure_Temporary_File Same expression on both sides of '=='.
CWE377_Insecure_Temporary_File Same expression on both sides of '!='.
CWE390_Error_Without_Action Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362).
CWE390_Error_Without_Action Condition '5!=5' is always false
CWE390_Error_Without_Action Condition '5==5' is always true
CWE390_Error_Without_Action Either the condition 'fileDesc==NULL' is redundant or there is possible null pointer dereference: fileDesc.
CWE390_Error_Without_Action non-finite double value. assert \is_finite(doubleNumber);
CWE390_Error_Without_Action non-finite double value. assert \is_finite(doubleNumber_0);
CWE390_Error_Without_Action Same expression on both sides of '=='.
CWE390_Error_Without_Action Same expression on both sides of '!='.
CWE390_Error_Without_Action Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE390_Error_Without_Action Variable 'fileDesc' is reassigned a value before the old one has been used.
CWE391_Unchecked_Error_Condition Condition '5!=5' is always false
CWE391_Unchecked_Error_Condition Condition '5==5' is always true
CWE391_Unchecked_Error_Condition non-finite double value. assert \is_finite(doubleNumber);
CWE391_Unchecked_Error_Condition non-finite double value. assert \is_finite(doubleNumber_0);
CWE391_Unchecked_Error_Condition Same expression on both sides of '=='.
CWE391_Unchecked_Error_Condition Same expression on both sides of '!='.
CWE391_Unchecked_Error_Condition Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE396_Catch_Generic_Exception Condition '5!=5' is always false
CWE396_Catch_Generic_Exception Condition '5==5' is always true
CWE396_Catch_Generic_Exception Same expression on both sides of '=='.
CWE396_Catch_Generic_Exception Same expression on both sides of '!='.
CWE397_Throw_Generic_Exception Condition '5!=5' is always false
CWE397_Throw_Generic_Exception Condition '5==5' is always true
CWE397_Throw_Generic_Exception Consecutive return, break, continue, goto or throw statements are unnecessary.
CWE397_Throw_Generic_Exception Same expression on both sides of '=='.
CWE397_Throw_Generic_Exception Same expression on both sides of '!='.
CWE398_Poor_Code_Quality Condition '5!=5' is always false
CWE398_Poor_Code_Quality Condition '5==5' is always true
CWE398_Poor_Code_Quality Redundant assignment of 'intOne' to itself.
CWE398_Poor_Code_Quality Redundant code: Found a statement that begins with numeric constant.
CWE398_Poor_Code_Quality Same expression on both sides of '=='.
CWE398_Poor_Code_Quality Same expression on both sides of '!='.
CWE398_Poor_Code_Quality signed overflow. assert i_0 + 1 ≤ 2147483647;
CWE398_Poor_Code_Quality signed overflow. assert i + 1 ≤ 2147483647;
CWE400_Resource_Exhaustion Calling undeclared function usleep. Old style K&R code?
CWE400_Resource_Exhaustion Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362).
CWE400_Resource_Exhaustion Completely invalid destination for assigns
CWE400_Resource_Exhaustion Condition '5!=5' is always false
CWE400_Resource_Exhaustion Condition '5==5' is always true
CWE400_Resource_Exhaustion Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126).
CWE400_Resource_Exhaustion Neither code nor specification for function connect, generating default assigns from the prototype
CWE400_Resource_Exhaustion Neither code nor specification for function usleep, generating default assigns from the prototype
CWE400_Resource_Exhaustion Same expression on both sides of '=='.
CWE400_Resource_Exhaustion Same expression on both sides of '!='.
CWE400_Resource_Exhaustion signed overflow. assert tmp_2 << 30 ≤ 2147483647;
CWE400_Resource_Exhaustion signed overflow. assert tmp << 30 ≤ 2147483647;
CWE400_Resource_Exhaustion Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119:CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length.
CWE400_Resource_Exhaustion The scope of the variable 'countRef' can be reduced.
CWE400_Resource_Exhaustion The scope of the variable 'filename' can be reduced.
CWE400_Resource_Exhaustion The scope of the variable 'i' can be reduced.
CWE400_Resource_Exhaustion The scope of the variable 'recvResult' can be reduced.
CWE400_Resource_Exhaustion Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended).
CWE400_Resource_Exhaustion Value stored to 'count' during its initialization is never read
CWE400_Resource_Exhaustion Value stored to 'count' is never read
CWE400_Resource_Exhaustion Variable 'count' is assigned a value that is never used.
CWE400_Resource_Exhaustion Variable 'count' is reassigned a value before the old one has been used.
CWE400_Resource_Exhaustion Variable 'pFile' is reassigned a value before the old one has been used.
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X returned to caller
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__char_calloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__char_malloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__char_realloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int64_t_calloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int64_t_malloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int64_t_realloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int_calloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int_malloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__int_realloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__struct_twoIntsStruct_calloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference
CWE401_Memory_Leak Address of stack memory allocated by call to alloca() on line X is still referred to by the global variable 'CWE401_Memory_Leak__struct_twoIntsStruct_malloc_45_goodG2BData' upon returning to the caller. This will be a dangling reference