Home / Vulnerability Database / C or C++ : Tainted read out of bounds
C/C++
C or C++ : Tainted read out of bounds
Overview
An argument obtained from an unreliable source is used for reading from the buffer. This may lead to a buffer boundaries violation, which could allow attackers to read sensitive information from other memory locations or cause a crash.
References
MEDIUM
DerScanner Severity Score
Do you want to fix C or C++ : Tainted read out of bounds in your application?
See also
C/C++
C or C++ : Dead store
C/C++
C or C++ : Use after free
C/C++
