The weakness exists due to improper passing of output buffer to a path manipulation function (e.g. realpath(), readlink(), PathAppend()) that leads to size reduction and butter overflow.
Such problems can cause modifying of memory, unauthorized code or commands execution and even denial of service or application crash.
The vulnerability is introduced during Implementation stage.
Latest vulnerabilities for CWE-785
No vulnerabilities found using your search criteria
Description of CWE-785 on Mitre website