Home / Vulnerability Database / C or C++ : Tainted read out of bounds
C/C++

C or C++ : Tainted read out of bounds

Classification

PCI DSS 4.0
CWE/SANS Top 25 2021

Overview

An argument obtained from an unreliable source is used for reading from the buffer. This may lead to a buffer boundaries violation, which could allow attackers to read sensitive information from other memory locations or cause a crash.

MEDIUM

DerScanner Severity Score

Do you want to fix C or C++ : Tainted read out of bounds in your application?

See also

C/C++

C or C++ : Dead store

C/C++

C or C++ : Use after free

C/C++

C or C++ : va_list uninitialized