CPP: Fix the test by adding PotentiallyDangerousFunction.

This commit is contained in:
Geoffrey White
2019-02-05 16:41:26 +00:00
parent 018450500d
commit 2321ae911e
3 changed files with 4 additions and 3 deletions

View File

@@ -1,6 +1,3 @@
| tests.cpp:112:9:112:12 | call to gets | gets does not guard against buffer overflow |
| tests.cpp:249:2:249:5 | call to gets | gets does not guard against buffer overflow |
| tests.cpp:250:2:250:5 | call to gets | gets does not guard against buffer overflow |
| tests.cpp:258:2:258:8 | call to sprintf | This conversion may yield a string of length 17, which exceeds the allocated buffer size of 10 |
| tests.cpp:259:2:259:8 | call to sprintf | This conversion may yield a string of length 17, which exceeds the allocated buffer size of 10 |
| tests.cpp:272:2:272:8 | call to sprintf | This conversion may yield a string of length 9, which exceeds the allocated buffer size of 8 |

View File

@@ -0,0 +1,3 @@
| tests.cpp:112:9:112:12 | call to gets | gets does not guard against buffer overflow |
| tests.cpp:249:2:249:5 | call to gets | gets does not guard against buffer overflow |
| tests.cpp:250:2:250:5 | call to gets | gets does not guard against buffer overflow |

View File

@@ -0,0 +1 @@
Security/CWE/CWE-676/PotentiallyDangerousFunction.ql