CWE-785 - Use of Path Manipulation Function without Maximum-sized Buffer

Description

The weakness exists due to improper passing of output buffer to a path manipulation function (e.g. realpath(), readlink(), PathAppend()) that leads to size reduction and butter overflow.
Such problems can cause modifying of memory, unauthorized code or commands execution and even denial of service or application crash.
The vulnerability is introduced during Implementation stage.

Latest vulnerabilities for CWE-785

No vulnerabilities found using your search criteria

References

Description of CWE-785 on Mitre website