EN JP CN

CERT C and C++ Secure Coding Standard IDs mapped to Klocwork C and C++ checkers

See also C and C++ checker reference.

RuleKlocwork Checker Code and Description
ARR00-C

ABV.ANY_SIZE_ARRAY  Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.ITERATOR  Buffer Overflow - Array Index may be out of Bounds

ABV.MEMBER  Buffer Overflow - Array Index Out of Bounds

ABV.STACK  Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED  Buffer Overflow from Unvalidated Input

ABV.UNICODE.BOUND_MAP  Buffer overflow in mapping character function

ABV.UNICODE.FAILED_MAP  Mapping function failed

ABV.UNICODE.NNTS_MAP  Buffer overflow in mapping character function

ABV.UNICODE.SELF_MAP  Mapping function failed

ABV.UNKNOWN_SIZE  Buffer Overflow - Array Index Out of Bounds

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.STRBO.BOUND_COPY.OVERFLOW  Buffer Overflow in Bound String Copy

SV.STRBO.BOUND_COPY.UNTERM  Possible Buffer Overflow in Following String Operations

SV.STRBO.BOUND_SPRINTF  Buffer Overflow in Bound sprintf

SV.STRBO.UNBOUND_COPY  Buffer Overflow in Unbound String Copy

SV.STRBO.UNBOUND_SPRINTF  Buffer Overflow in Unbound sprintf

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

SV.TAINTED.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition

SV.UNBOUND_STRING_INPUT.CIN  Usage of cin for unbounded string input

SV.UNBOUND_STRING_INPUT.FUNC  Usage of unbounded string input

ARR01-C

CWARN.MEMSET.SIZEOF.PTR  Memset-like function is called for 'sizeof' applied to pointer

ARR30-C

ABV.ANY_SIZE_ARRAY  Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.STACK  Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED  Buffer Overflow from Unvalidated Input

ABV.UNICODE.BOUND_MAP  Buffer overflow in mapping character function

ABV.UNICODE.FAILED_MAP  Mapping function failed

ABV.UNICODE.NNTS_MAP  Buffer overflow in mapping character function

ABV.UNICODE.SELF_MAP  Mapping function failed

ABV.UNKNOWN_SIZE  Buffer Overflow - Array Index Out of Bounds

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.STRBO.BOUND_COPY.OVERFLOW  Buffer Overflow in Bound String Copy

SV.STRBO.BOUND_COPY.UNTERM  Possible Buffer Overflow in Following String Operations

SV.STRBO.BOUND_SPRINTF  Buffer Overflow in Bound sprintf

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

SV.TAINTED.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition

SV.UNBOUND_STRING_INPUT.CIN  Usage of cin for unbounded string input

SV.UNBOUND_STRING_INPUT.FUNC  Usage of unbounded string input

ARR38-C

ABV.ANY_SIZE_ARRAY  Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.ITERATOR  Buffer Overflow - Array Index may be out of Bounds

ABV.STACK  Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED  Buffer Overflow from Unvalidated Input

ABV.UNKNOWN_SIZE  Buffer Overflow - Array Index Out of Bounds

CON02-CPP

CONC.DL  Deadlock

CON05-C

CONC.SLEEP  Function may block in critical section

CON35-C

CONC.DL  Deadlock

CTR01-CPP

CWARN.MEMSET.SIZEOF.PTR  Memset-like function is called for 'sizeof' applied to pointer

INCORRECT.ALLOC_SIZE  Incorrect Allocation Size

CTR50-CPP

ABV.ANY_SIZE_ARRAY  Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.STACK  Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED  Buffer Overflow from Unvalidated Input

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

DCL01-C

MISRA.VAR.HIDDEN Identifier declared in an inner scope hides identifier in outer scope

DCL01-CPP

MISRA.VAR.HIDDEN Identifier declared in an inner scope hides identifier in outer scope

DCL07-C

MISRA.CAST.FUNC_PTR.2012 Conversion performed between a pointer to a function and another incompatible type

MISRA.FUNC.NOPROT.DEF Function has a definition but no prototype

MISRA.FUNC.PROT_FORM.KR.2012 Function types shall be in prototype form

DCL07-CPP

MISRA.VAR.MIN.VIS Name visibility is too wide

DCL10-C

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.FEW  Too few arguments in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.MANY  Too many arguments in a print function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.FEW  Too few arguments in a scan function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.MANY  Too many arguments in a scan function call

DCL10-CPP

MISRA.BIN_OP.OVERLOAD Comma, || or && operator overloaded

MISRA.UN_OP.OVERLOAD Unary & operator is overloaded

DCL11-C

MISRA.FUNC.VARARG Function with variable number of arguments

SV.FMT_STR.PRINT_FORMAT_MISMATCH.BAD  Incompatible type of a print function parameter

SV.FMT_STR.PRINT_FORMAT_MISMATCH.UNDESIRED  Unexpected type of a print function parameter

SV.FMT_STR.PRINT_IMPROP_LENGTH  Improper use of length modifier in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.FEW  Too few arguments in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.MANY  Too many arguments in a print function call

SV.FMT_STR.SCAN_FORMAT_MISMATCH.BAD  Incompatible type of a scan function parameter

SV.FMT_STR.SCAN_FORMAT_MISMATCH.UNDESIRED  Unexpected type of a scan function parameter

SV.FMT_STR.UNKWN_FORMAT.SCAN  Unknown format specifier in a scan function call

DCL12-CPP

MISRA.SPEC.ILL Explicit instantiation of a template makes the code ill-formed

DCL13-C

MISRA.PPARAM.NEEDS.CONST Pointer parameter is not used to modify the addressed object but is not declared as a pointer to const

DCL18-C

MISRA.TOKEN.OCTAL.ESCAPE Usage of octal escape sequences

MISRA.TOKEN.OCTAL.INT Usage of octal integer constants

DCL19-CPP

UNINIT.CTOR.MIGHT  Uninitialized Variable in Constructor - possible

UNINIT.CTOR.MUST  Uninitialized Variable in Constructor

UNINIT.HEAP.MIGHT  Uninitialized Heap Use - possible

UNINIT.HEAP.MUST  Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT  Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST  Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST  Partialy Uninitialized Array

UNINIT.STACK.MIGHT  Uninitialized Variable - possible

UNINIT.STACK.MUST  Uninitialized Variable

DCL20-C

MISRA.FUNC.NO_PARAMS Function without parameters is missing void parameter type

DCL23-C

MISRA.IDENT.DISTINCT.C99.2012 Identifiers declared in the same scope or name space are not distinct

DCL30-C

LOCRET.ARG  Function returns address of local variable

LOCRET.GLOB  Function returns address of local variable

LOCRET.RET  Function returns address of local variable

DCL31-C

CWARN.IMPLICITINT  Anachronistic 'implicit int'

FUNCRET.IMPLICIT  Non-void function implicitly returning int does not return value

MISRA.DECL.NO_TYPE Declaration without a type

MISRA.FUNC.NOPROT.CALL Function is called but has no prototype

RETVOID.IMPLICIT  Implicitly int function returns void value

DCL36-C

MISRA.FUNC.STATIC.REDECL Function or object redeclaration does not include 'static' modifier

DCL37-C

MISRA.DEFINE.WRONGNAME.UNDERSCORE Usage of a reserved name for naming a macro

MISRA.STDLIB.WRONGNAME Reused name of standard library macro, object or function

MISRA.STDLIB.WRONGNAME.UNDERSCORE Usage of a reserved name for naming a language entity

DCL39-C

PORTING.STORAGE.STRUCT  Byte position of elements in a structure could depend on alignment and packing attributes.

PORTING.STRUCT.BOOL  Struct/class has a bool member

ENV01-C

ABV.ANY_SIZE_ARRAY  Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.ITERATOR  Buffer Overflow - Array Index may be out of Bounds

ABV.MEMBER  Buffer Overflow - Array Index Out of Bounds

ABV.STACK  Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED  Buffer Overflow from Unvalidated Input

ABV.UNICODE.BOUND_MAP  Buffer overflow in mapping character function

ABV.UNICODE.FAILED_MAP  Mapping function failed

ABV.UNICODE.NNTS_MAP  Buffer overflow in mapping character function

ABV.UNICODE.SELF_MAP  Mapping function failed

ABV.UNKNOWN_SIZE  Buffer Overflow - Array Index Out of Bounds

ENV02-CPP

MISRA.STDLIB.ABORT Use of 'abort', 'exit', 'getenv' or 'system' from library stdlib.h

SV.CODE_INJECTION.SHELL_EXEC  Command Injection into Shell Execution

SV.TAINTED.INJECTION  Command Injection

ENV33-C

MISRA.STDLIB.ABORT Use of 'abort', 'exit', 'getenv' or 'system' from library stdlib.h

SV.CODE_INJECTION.SHELL_EXEC  Command Injection into Shell Execution

SV.TAINTED.INJECTION  Command Injection

ERR01-CPP

MISRA.STDLIB.ERRNO Use of error indicator 'errno'

ERR08-CPP

MISRA.THROW.PTR Exception object is a pointer

ERR09-CPP

MISRA.CATCH.BY_VALUE Exception object of class type is caught by value

MISRA.THROW.PTR Exception object is a pointer

ERR10-CPP

NPD.FUNC.MUST  Result of function that may return NULL will be dereferenced

SV.RVT.RETVAL_NOTTESTED  Ignored Return Value

ERR34-C

MISRA.STDLIB.ATOI Use of 'atof', 'atoi' or 'atol' from library stdlib.h

ERR50-CPP

MISRA.CATCH.ALL No ellipsis exception handler in a try-catch block

ERR52-CPP

MISRA.STDLIB.LONGJMP Use of setjmp macro or longjmp function

ERR53-CPP

MISRA.CTOR.TRY.NON_STATIC Function try/catch block of constructor or destructor references non-static members

ERR54-CPP

MISRA.CATCH.NOALL Ellipsis exception handler is not the last one in a try-catch block

MISRA.CATCH.WRONGORD Handler for a base exception class precedes to a handler for a derived exception class in a try-catch block

EXP00-C

MISRA.EXPR.PARENS.2012 The precedence of operators within expressions should be made explicit.

EXP00-CPP

MISRA.EXPR.PARENS 

MISRA.EXPR.PARENS.INSUFFICIENT Limited dependence required for operator precedence rules in expressions

MISRA.EXPR.PARENS.REDUNDANT Limited dependence required for operator precedence rules in expressions

EXP01-CPP

CWARN.MEMSET.SIZEOF.PTR  Memset-like function is called for 'sizeof' applied to pointer

INCORRECT.ALLOC_SIZE  Incorrect Allocation Size

EXP02-C

MISRA.LOGIC.SIDEEFF Right operand in a logical 'and' or 'or' expression contains side effects

EXP05-CPP

BSTR.CAST.C  C style type cast to BSTR

MISRA.C_CAST C-style cast to non-void type

EXP06-CPP

MISRA.SIZEOF.SIDE_EFFECT Operand of sizeof has side effects

EXP08-C

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.ITERATOR  Buffer Overflow - Array Index may be out of Bounds

EXP08-CPP

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

ABV.ITERATOR  Buffer Overflow - Array Index may be out of Bounds

MISRA.PTR.ARITH Pointer is used in arithmetic or array index expression

EXP09-CPP

INCORRECT.ALLOC_SIZE  Incorrect Allocation Size

EXP10-CPP

PORTING.VAR.EFFECTS  Variable used twice in one expression where one usage is subject to side-effects

EXP11-CPP

PORTING.BITFIELDS  Usage of bitfields within a structure

PORTING.CAST.FLTPNT  Cast of a floating point expression to a non floating point type

PORTING.CAST.PTR  Cast between types that are not both pointers or not pointers

PORTING.CAST.PTR.FLTPNT  Cast of a pointer to a floating point expression to a non floating point type pointer

PORTING.CAST.PTR.SIZE  Attempt to cast an expression to a type of a potentially incompatible size

PORTING.CAST.SIZE  Expression is cast to a type of potentially different size

EXP12-C

MISRA.FUNC.UNUSEDRET.2012 The return value of a non-void function shall be used.

SV.RVT.RETVAL_NOTTESTED  Ignored Return Value

EXP12-CPP

MISRA.FUNC.UNUSEDRET Return value of a non-void function is not used

SV.RVT.RETVAL_NOTTESTED  Ignored Return Value

EXP15-C

SEMICOL  Suspiciously placed semicolon

EXP15-CPP

MISRA.CAST.UNSIGNED_BITS The result of bitwise operation on unsigned char or short is not cast back to original type

EXP16-C

CWARN.FUNCADDR  Function address is used instead of a call to this function

CWARN.NULLCHECK.FUNCNAME  Function address was directly compared against 0

EXP19-C

MISRA.IF.NO_COMPOUND The body of if/else statement is not a compound statement

MISRA.STMT.NO_COMPOUND The body of switch, while, do/while or for statement is not a compound statement

EXP30-C

PORTING.VAR.EFFECTS  Variable used twice in one expression where one usage is subject to side-effects

EXP33-C

UNINIT.HEAP.MIGHT  Uninitialized Heap Use - possible

UNINIT.HEAP.MUST  Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT  Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST  Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST  Partialy Uninitialized Array

UNINIT.STACK.MIGHT  Uninitialized Variable - possible

UNINIT.STACK.MUST  Uninitialized Variable

EXP34-C

NPD.CHECK.CALL.MIGHT  Pointer may be passed to function that can dereference it after it was positively checked for NULL

NPD.CHECK.CALL.MUST  Pointer will be passed to function that may dereference it after it was positively checked for NULL

NPD.CHECK.MIGHT  Pointer may be dereferenced after it was positively checked for NULL

NPD.CHECK.MUST  Pointer will be dereferenced after it was positively checked for NULL

NPD.CONST.CALL  NULL is passed to function that can dereference it

NPD.CONST.DEREF  NULL is dereferenced

NPD.FUNC.CALL.MIGHT  Result of function that may return NULL may be passed to another function that may dereference it

NPD.FUNC.CALL.MUST  Result of function that may return NULL will be passed to another function that may dereference it

NPD.FUNC.MIGHT  Result of function that can return NULL may be dereferenced

NPD.FUNC.MUST  Result of function that may return NULL will be dereferenced

NPD.GEN.CALL.MIGHT  Null pointer may be passed to function that may dereference it

NPD.GEN.CALL.MUST  Null pointer will be passed to function that may dereference it

NPD.GEN.MIGHT  Null pointer may be dereferenced

NPD.GEN.MUST  Null pointer will be dereferenced

RNPD.CALL  Suspicious dereference of pointer in function call before NULL check

RNPD.DEREF  Suspicious dereference of pointer before NULL check

EXP34-CPP

NPD.CHECK.CALL.MIGHT  Pointer may be passed to function that can dereference it after it was positively checked for NULL

NPD.CHECK.CALL.MUST  Pointer will be passed to function that may dereference it after it was positively checked for NULL

NPD.CHECK.MIGHT  Pointer may be dereferenced after it was positively checked for NULL

NPD.CHECK.MUST  Pointer will be dereferenced after it was positively checked for NULL

NPD.CONST.CALL  NULL is passed to function that can dereference it

NPD.CONST.DEREF  NULL is dereferenced

NPD.FUNC.CALL.MIGHT  Result of function that may return NULL may be passed to another function that may dereference it

NPD.FUNC.CALL.MUST  Result of function that may return NULL will be passed to another function that may dereference it

NPD.FUNC.MIGHT  Result of function that can return NULL may be dereferenced

NPD.FUNC.MUST  Result of function that may return NULL will be dereferenced

NPD.GEN.CALL.MIGHT  Null pointer may be passed to function that may dereference it

NPD.GEN.CALL.MUST  Null pointer will be passed to function that may dereference it

NPD.GEN.MIGHT  Null pointer may be dereferenced

NPD.GEN.MUST  Null pointer will be dereferenced

RNPD.CALL  Suspicious dereference of pointer in function call before NULL check

RNPD.DEREF  Suspicious dereference of pointer before NULL check

EXP36-C

MISRA.CAST.PTR.UNRELATED Object of pointer type cast to unrelated type

MISRA.CAST.PTR_TO_INT Cast between a pointer and an integral type

PORTING.CAST.PTR  Cast between types that are not both pointers or not pointers

PORTING.CAST.PTR.FLTPNT  Cast of a pointer to a floating point expression to a non floating point type pointer

PORTING.CAST.PTR.SIZE  Attempt to cast an expression to a type of a potentially incompatible size

PORTING.CAST.SIZE  Expression is cast to a type of potentially different size

EXP37-C

MISRA.FUNC.UNMATCHED.PARAMS Number of formal and actual parameters passed to function do not match

EXP44-C

MISRA.SIZEOF.SIDE_EFFECT Operand of sizeof has side effects

EXP45-C

ASSIGCOND.CALL  Assignment in condition (call)

ASSIGCOND.GEN  Assignment in condition

MISRA.ASSIGN.COND Assignment operator is used in a condition

EXP46-C

MISRA.LOGIC.OPERATOR.NOT_BOOL Operand of non-logical operator is effectively boolean

EXP50-CPP

MISRA.EXPR.PARENS 

MISRA.EXPR.PARENS.INSUFFICIENT Limited dependence required for operator precedence rules in expressions

MISRA.EXPR.PARENS.REDUNDANT Limited dependence required for operator precedence rules in expressions

MISRA.INCR_DECR.OTHER Increment or decrement operator is mixed with other operators in expression

PORTING.VAR.EFFECTS  Variable used twice in one expression where one usage is subject to side-effects

EXP52-CPP

MISRA.SIZEOF.SIDE_EFFECT Operand of sizeof has side effects

EXP53-CPP

UNINIT.CTOR.MIGHT  Uninitialized Variable in Constructor - possible

UNINIT.CTOR.MUST  Uninitialized Variable in Constructor

UNINIT.HEAP.MIGHT  Uninitialized Heap Use - possible

UNINIT.HEAP.MUST  Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT  Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST  Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST  Partialy Uninitialized Array

UNINIT.STACK.MIGHT  Uninitialized Variable - possible

UNINIT.STACK.MUST  Uninitialized Variable

EXP54-CPP

CL.FFM.ASSIGN  Use of free memory (double free) - no operator=

CL.FFM.COPY  Use of free memory (double free) - no copy constructor

LOCRET.ARG  Function returns address of local variable

LOCRET.GLOB  Function returns address of local variable

LOCRET.RET  Function returns address of local variable

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

UNINIT.HEAP.MIGHT  Uninitialized Heap Use - possible

UNINIT.HEAP.MUST  Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT  Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST  Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST  Partialy Uninitialized Array

UNINIT.STACK.MIGHT  Uninitialized Variable - possible

UNINIT.STACK.MUST  Uninitialized Variable

EXP55-CPP

MISRA.CAST.CONST Cast operation removes const or volatile modifier from a pointer or reference

EXP56-CPP

MISRA.CAST.PTR.UNRELATED Object of pointer type cast to unrelated type

MISRA.CAST.PTR_TO_INT Cast between a pointer and an integral type

PORTING.CAST.PTR  Cast between types that are not both pointers or not pointers

PORTING.CAST.PTR.FLTPNT  Cast of a pointer to a floating point expression to a non floating point type pointer

PORTING.CAST.PTR.SIZE  Attempt to cast an expression to a type of a potentially incompatible size

PORTING.CAST.SIZE  Expression is cast to a type of potentially different size

FIO00-CPP

SV.FMT_STR.PRINT_FORMAT_MISMATCH.BAD  Incompatible type of a print function parameter

SV.FMT_STR.PRINT_FORMAT_MISMATCH.UNDESIRED  Unexpected type of a print function parameter

SV.FMT_STR.PRINT_IMPROP_LENGTH  Improper use of length modifier in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.FEW  Too few arguments in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.MANY  Too many arguments in a print function call

SV.FMT_STR.UNKWN_FORMAT  Unknown format specifier in a print function call

FIO01-C

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

FIO01-CPP

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

FIO02-C

SV.DLLPRELOAD.NONABSOLUTE.DLL  Potential DLL-preload hijack vector

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

FIO02-CPP

SV.DLLPRELOAD.NONABSOLUTE.DLL  Potential DLL-preload hijack vector

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

FIO04-CPP

MISRA.FUNC.UNUSEDRET Return value of a non-void function is not used

SV.RVT.RETVAL_NOTTESTED  Ignored Return Value

FIO17-CPP

MISRA.INCL.UNSAFE Unsafe header inclusion

MISRA.STDLIB.STDIO Use of input/output library stdio.h in production code

FIO22-C

RH.LEAK  Resource leak

FIO30-C

SV.FMTSTR.GENERIC  Format String Vulnerability

SV.TAINTED.FMTSTR  Use of Unvalidated Data in a Format String

FIO34-C

CWARN.CMPCHR.EOF  A 'char' expression compared with EOF constant

FIO42-C

RH.LEAK  Resource leak

FIO45-C

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

FIO46-C

SV.INCORRECT_RESOURCE_HANDLING.URH  Insecure Resource Handling

FIO47-C

SV.FMT_STR.PRINT_FORMAT_MISMATCH.BAD  Incompatible type of a print function parameter

SV.FMT_STR.PRINT_FORMAT_MISMATCH.UNDESIRED  Unexpected type of a print function parameter

SV.FMT_STR.PRINT_IMPROP_LENGTH  Improper use of length modifier in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.FEW  Too few arguments in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.MANY  Too many arguments in a print function call

SV.FMT_STR.SCAN_FORMAT_MISMATCH.BAD  Incompatible type of a scan function parameter

SV.FMT_STR.SCAN_FORMAT_MISMATCH.UNDESIRED  Unexpected type of a scan function parameter

SV.FMT_STR.SCAN_IMPROP_LENGTH  Improper use of length modifier in a scan function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.FEW  Too few arguments in a scan function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.MANY  Too many arguments in a scan function call

SV.FMT_STR.UNKWN_FORMAT  Unknown format specifier in a print function call

FIO51-CPP

RH.LEAK  Resource leak

FLP30-C

MISRA.FOR.COND.FLT Floating point object is used in the condition section of a 'for' loop

MISRA.FOR.COUNTER.FLT For loop counter has a floating point type

INT02-C

MISRA.CAST.INT Non-trivial integer expression is cast to a wider type, or type with a different signedness

MISRA.CAST.UNSIGNED_BITS The result of bitwise operation on unsigned char or short is not cast back to original type

MISRA.CONV.INT.SIGN Implicit integral conversion changes signedness

MISRA.CVALUE.IMPL.CAST The value of an expression implicitly converted to a different type

MISRA.UMINUS.UNSIGNED Operand of unary minus is unsigned

PRECISION.LOSS  Loss of Precision

INT02-CPP

MISRA.CAST.INT Non-trivial integer expression is cast to a wider type, or type with a different signedness

MISRA.CAST.UNSIGNED_BITS The result of bitwise operation on unsigned char or short is not cast back to original type

MISRA.CONV.INT.SIGN Implicit integral conversion changes signedness

MISRA.CVALUE.IMPL.CAST The value of an expression implicitly converted to a different type

MISRA.UMINUS.UNSIGNED Operand of unary minus is unsigned

PRECISION.LOSS  Loss of Precision

INT04-C

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

SV.TAINTED.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition

INT04-CPP

ABV.GENERAL  Buffer Overflow - Array Index Out of Bounds

INCORRECT.ALLOC_SIZE  Incorrect Allocation Size

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.STRBO.UNBOUND_COPY  Buffer Overflow in Unbound String Copy

SV.STRBO.UNBOUND_SPRINTF  Buffer Overflow in Unbound sprintf

INT05-CPP

SV.BANNED.RECOMMENDED.SCANF  Banned recommended API: unsafe scanf-type functions

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

SV.TAINTED.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition

INT06-CPP

MISRA.STDLIB.ATOI Use of 'atof', 'atoi' or 'atol' from library stdlib.h

SV.BANNED.RECOMMENDED.SCANF  Banned recommended API: unsafe scanf-type functions

INT07-C

PORTING.SIGNED.CHAR  'char' used without explicitly specifying signedness

INT07-CPP

MISRA.CHAR.NOT_CHARACTER 'char' is used for non-character value

MISRA.SIGNED_CHAR.NOT_NUMERIC 'signed char' or 'unsigned char' is used for non-numeric value

PORTING.UNSIGNEDCHAR.OVERFLOW.FALSE  Relational expression may be always false depending on 'char' type signedness

INT09-C

MISRA.ENUM.IMPLICIT.VAL.NON_UNIQUE.2012 Implicit enumerator value is not unique

INT11-CPP

PORTING.CAST.PTR  Cast between types that are not both pointers or not pointers

INT12-C

MISRA.BITFIELD.TYPE Type of bit-field is not signed/unsigned integer

INT12-CPP

MISRA.BITFIELD.TYPE Type of bit-field is not signed/unsigned integer

INT13-C

MISRA.BITS.NOT_UNSIGNED Operand of bitwise operation is not unsigned integer

MISRA.BITS.NOT_UNSIGNED.PREP Operand of bitwise operation is not unsigned integer

INT13-CPP

MISRA.BITS.NOT_UNSIGNED Operand of bitwise operation is not unsigned integer

MISRA.BITS.NOT_UNSIGNED.PREP Operand of bitwise operation is not unsigned integer

INT30-C

CWARN.NOEFFECT.OUTOFRANGE  Value outside of range

NUM.OVERFLOW  Possible Overflow

INT31-C

PRECISION.LOSS  Loss of Precision

PRECISION.LOSS.CALL  Loss of Precision during function call

INT33-C

DBZ.CONST  Division by a zero constant occurs

DBZ.CONST.CALL  The value '0' is passed to function that can use this value as divisor

DBZ.GENERAL  Division by zero might occur

DBZ.ITERATOR  Division by zero might occur in a loop iterator

INT36-C

MISRA.CAST.OBJ_PTR_TO_INT.2012 Conversion performed between a pointer to an object and an integer type

MEM00-C

FNH.MIGHT  Freeing Non-Heap Memory - possible

FNH.MUST  Freeing Non-Heap Memory

FREE.INCONSISTENT  Inconsistent Freeing of Memory

FUM.GEN.MIGHT  Freeing Unallocated Memory - possible

FUM.GEN.MUST  Freeing Unallocated Memory

MLK.MIGHT  Memory Leak - possible

MLK.MUST  Memory Leak

MLK.RET.MIGHT  Memory Leak - possible

MLK.RET.MUST  Memory Leak

RH.LEAK  Resource leak

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

MEM00-CPP

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

MEM01-CPP

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

MEM05-C

MISRA.FUNC.RECUR Recursive function

MEM05-CPP

MISRA.FUNC.RECUR Recursive function

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

MEM09-CPP

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

UNINIT.HEAP.MIGHT  Uninitialized Heap Use - possible

UNINIT.HEAP.MUST  Uninitialized Heap Use

MEM12-C

MLK.MIGHT  Memory Leak - possible

MLK.MUST  Memory Leak

MLK.RET.MIGHT  Memory Leak - possible

MLK.RET.MUST  Memory Leak

RH.LEAK  Resource leak

MEM30-C

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

MEM31-C

MLK.MIGHT  Memory Leak - possible

MLK.MUST  Memory Leak

MLK.RET.MIGHT  Memory Leak - possible

MLK.RET.MUST  Memory Leak

MEM34-C

FNH.MIGHT  Freeing Non-Heap Memory - possible

FNH.MUST  Freeing Non-Heap Memory

FUM.GEN.MIGHT  Freeing Unallocated Memory - possible

FUM.GEN.MUST  Freeing Unallocated Memory

MEM35-C

INCORRECT.ALLOC_SIZE  Incorrect Allocation Size

MEM50-CPP

UFM.DEREF.MIGHT  Use of free memory (access) - possible

UFM.DEREF.MUST  Use of Freed Memory by Pointer

UFM.FFM.MIGHT  Use of free memory (double free) - possible

UFM.FFM.MUST  Freeing Freed Memory

UFM.RETURN.MIGHT  Use of freed memory (return) - possible

UFM.RETURN.MUST  Use of Freed Memory on Return

UFM.USE.MIGHT  Use of free memory - possible

UFM.USE.MUST  Use of Freed Memory

MSC01-C

CWARN.EMPTY.LABEL  Empty label statement

INFINITE_LOOP.GLOBAL  Infinite loop

INFINITE_LOOP.LOCAL  Infinite loop

INFINITE_LOOP.MACRO  Infinite loop

LA_UNUSED  Label unused

MISRA.IF.NO_ELSE A chain of if/else-if statements is not terminated with else or is terminated with an empty else clause

MISRA.SWITCH.NODEFAULT No default clause at the end of a switch statement

MISRA.SWITCH.WELL_FORMED.DEFAULT.2012 Every switch statement shall have a default label.

MSC01-CPP

CWARN.EMPTY.LABEL  Empty label statement

LA_UNUSED  Label unused

MISRA.IF.NO_ELSE A chain of if/else-if statements is not terminated with else or is terminated with an empty else clause

MISRA.SWITCH.NODEFAULT No default clause at the end of a switch statement

MSC02-CPP

ASSIGCOND.CALL  Assignment in condition (call)

ASSIGCOND.GEN  Assignment in condition

EFFECT  Statement has no effect

MISRA.FUNC.ADDR Address of a function is used without & operator

MSC03-CPP

EFFECT  Statement has no effect

SEMICOL  Suspiciously placed semicolon

MSC04-CPP

MISRA.TOKEN.BADCOM Inappropriate character sequence in a comment

MSC07-C

INVARIANT_CONDITION.UNREACH  Invariant expression in a condition

LA_UNUSED  Label unused

UNREACH.GEN  Unreachable code

UNREACH.RETURN  Unreachable Void Return

UNREACH.SIZEOF  Architecture-related unreachable code

MSC07-CPP

LA_UNUSED  Label unused

UNREACH.GEN  Unreachable code

UNREACH.RETURN  Unreachable Void Return

UNREACH.SIZEOF  Architecture-related unreachable code

VA_UNUSED.GEN  Value is Never Used after Assignment

VA_UNUSED.INIT  Value is Never Used after Initialization

MSC08-CPP

ABV.TAINTED  Buffer Overflow from Unvalidated Input

SV.TAINTED.ALLOC_SIZE  Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.BINOP  Use of Unvalidated Integer in Binary Operation

SV.TAINTED.CALL.INDEX_ACCESS  Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND  Use of Unvalidated Integer in Loop Condition through a Function Call

SV.TAINTED.INDEX_ACCESS  Use of Unvalidated Integer as Array Index

MSC12-C

CWARN.NOEFFECT.SELF_ASSIGN  A variable is assigned to self

CWARN.NOEFFECT.UCMP.GE  Comparison of unsigned value against 0 is always true

CWARN.NOEFFECT.UCMP.GE.MACRO  Comparison of unsigned value against 0 within a macro is always true

CWARN.NOEFFECT.UCMP.LT  Comparison of unsigned value against 0 is always false

CWARN.NOEFFECT.UCMP.LT.MACRO  Comparison of unsigned value against 0 within a macro is always false

CWARN.NULLCHECK.FUNCNAME  Function address was directly compared against 0

EFFECT  Statement has no effect

INVARIANT_CONDITION.UNREACH  Invariant expression in a condition

LA_UNUSED  Label unused

MISRA.STMT.NO_EFFECT The statement has no side effects, and does not change control flow

UNREACH.GEN  Unreachable code

UNREACH.RETURN  Unreachable Void Return

UNREACH.SIZEOF  Architecture-related unreachable code

VA_UNUSED.GEN  Value is Never Used after Assignment

VA_UNUSED.INIT  Value is Never Used after Initialization

MSC12-CPP

CWARN.NOEFFECT.SELF_ASSIGN  A variable is assigned to self

CWARN.NOEFFECT.UCMP.GE  Comparison of unsigned value against 0 is always true

CWARN.NOEFFECT.UCMP.GE.MACRO  Comparison of unsigned value against 0 within a macro is always true

CWARN.NOEFFECT.UCMP.LT  Comparison of unsigned value against 0 is always false

CWARN.NOEFFECT.UCMP.LT.MACRO  Comparison of unsigned value against 0 within a macro is always false

CWARN.NULLCHECK.FUNCNAME  Function address was directly compared against 0

EFFECT  Statement has no effect

MISRA.STMT.NO_EFFECT The statement has no side effects, and does not change control flow

UNREACH.GEN  Unreachable code

UNREACH.RETURN  Unreachable Void Return

UNREACH.SIZEOF  Architecture-related unreachable code

MSC13-C

LV_UNUSED.GEN  Local variable unused

VA_UNUSED.GEN  Value is Never Used after Assignment

VA_UNUSED.INIT  Value is Never Used after Initialization

MSC13-CPP

LV_UNUSED.GEN  Local variable unused

VA_UNUSED.GEN  Value is Never Used after Assignment

VA_UNUSED.INIT  Value is Never Used after Initialization

MSC17-C

MISRA.SWITCH.WELL_FORMED.BREAK.2012 An unconditional break statement shall terminate every switch-clause.

MSC18-CPP

MISRA.SWITCH.NO_BREAK No break or throw statement at the end of switch-clause

MISRA.SWITCH.WELL_FORMED.BREAK.2012 An unconditional break statement shall terminate every switch-clause.

MSC20-CPP

MISRA.SWITCH.LABEL A switch label belongs to nested compound statement inside switch body

MISRA.SWITCH.WELL_FORMED.BREAK.2012 An unconditional break statement shall terminate every switch-clause.

MSC21-CPP

MISRA.FOR.COND.EQ ++ or -- operations are not used to change loop counter, but condition tests loop counter for equality

MSC37-C

FUNCRET.GEN  Non-void function does not return value

MISRA.RETURN.NOT_LAST Return is not the last statement in a function

OOP52-CPP

CL.MLK.VIRTUAL  Memory Leak - possible in destructor

CWARN.DTOR.NONVIRT.DELETE  Delete expression for an object of a class with virtual methods and no virtual destructor

OOP54-CPP

CL.SELF-ASSIGN  Use of free memory (double free) - in operator=

POS02-C

SV.BRM.HKEY_LOCAL_MACHINE  HKEY_LOCAL_MACHINE Used as 'hkey' Parameter for Registry Manipulation Function

SV.USAGERULES.PERMISSIONS  Use of Privilege Elevation

POS35-C

SV.TOCTOU.FILE_ACCESS  Time of Creation/Time of Use Race condition in File Access

POS36-C

SV.FIU.PROCESS_VARIANTS  Use of Dangerous Process Creation

SV.USAGERULES.PERMISSIONS  Use of Privilege Elevation

SV.USAGERULES.PROCESS_VARIANTS  Use of Dangerous Process Creation Function

POS37-C

SV.FIU.PROCESS_VARIANTS  Use of Dangerous Process Creation

SV.USAGERULES.PERMISSIONS  Use of Privilege Elevation

POS39-C

BYTEORDER.HTON.SEND  Missed conversion from host to network byte order

BYTEORDER.HTON.WRITE  Missed conversion from host to network byte order

BYTEORDER.NTOH.READ  Missed conversion from network to host byte order

BYTEORDER.NTOH.RECV  Missed conversion from network to host byte order

POS51-C

CONC.DL  Deadlock

POS52-C

CONC.SLEEP  Function may block in critical section

POS54-C

SV.RVT.RETVAL_NOTTESTED  Ignored Return Value

PRE00-C

MISRA.DEFINE.FUNC Function-like macro definition

PRE00-CPP

MISRA.DEFINE.FUNC Function-like macro definition

MISRA.USE.EXPANSION Macro expansion

PRE01-C

MISRA.DEFINE.NOPARS Macro parameter with no parentheses

PRE01-CPP

MISRA.DEFINE.NOPARS Macro parameter with no parentheses

PRE02-C

MISRA.DEFINE.BADEXP Inappropriate macro expansion

PRE04-CPP

MISRA.STDLIB.WRONGNAME Reused name of standard library macro, object or function

MISRA.STDLIB.WRONGNAME.UNDERSCORE Usage of a reserved name for naming a language entity

MISRA.UNDEF.WRONGNAME Undefinition of a name from the standard library

MISRA.UNDEF.WRONGNAME.UNDERSCORE Undefinition of a reserved name

PRE05-C

MISRA.DEFINE.SHARP.ORDER.2012 Unspecified order of evaluation of multiple '#' or '##'

PRE06-C

MISRA.INCGUARD Include guard is not provided

PRE06-CPP

MISRA.INCGUARD Include guard is not provided

PRE07-CPP

MISRA.CHAR.TRIGRAPH Trigraph usage

PRE09-CPP

SV.BANNED.RECOMMENDED.ALLOCA  Banned recommended API: stack allocation functions

SV.BANNED.RECOMMENDED.NUMERIC  Banned recommended API: unsafe numeric conversion functions

SV.BANNED.RECOMMENDED.OEM  Banned recommended API: OEM character page conversion functions

SV.BANNED.RECOMMENDED.PATH  Banned recommended API: unsafe path name manipulation functions

SV.BANNED.RECOMMENDED.SCANF  Banned recommended API: unsafe scanf-type functions

SV.BANNED.RECOMMENDED.SPRINTF  Banned recommended API: unsafe sprintf-type functions

SV.BANNED.RECOMMENDED.STRLEN  Banned recommended API: unsafe string length functions

SV.BANNED.RECOMMENDED.TOKEN  Banned recommended API: unsafe string tokenizing functions

SV.BANNED.RECOMMENDED.WINDOW  Banned recommended API: unsafe window functions

SV.BANNED.REQUIRED.CONCAT  Banned required API: unsafe string concatenation functions

SV.BANNED.REQUIRED.COPY  Banned required API: unsafe buffer copy functions

SV.BANNED.REQUIRED.GETS  Banned required API: unsafe stream reading functions

SV.BANNED.REQUIRED.ISBAD  Banned required API: IsBad-type functions

SV.BANNED.REQUIRED.SPRINTF  Banned required API: unsafe sprintf-type functions

PRE10-C

MISRA.DEFINE.BADEXP Inappropriate macro expansion

STR02-C

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.TAINTED.INJECTION  Command Injection

STR02-CPP

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.TAINTED.INJECTION  Command Injection

STR03-C

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

STR03-CPP

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

STR04-CPP

MISRA.CHAR.NOT_CHARACTER 'char' is used for non-character value

STR05-C

MISRA.STRING_LITERAL.NON_CONST.2012 A string literal shall not be assigned to an object unless the object's type is pointer to const-qualified char

STR06-CPP

SV.BANNED.RECOMMENDED.TOKEN  Banned recommended API: unsafe string tokenizing functions

STR07-CPP

MISRA.CHAR.OPERAND Expression of type 'char' or 'wchar_t' is used as non-character operand

STR31-C

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

SV.STRBO.BOUND_COPY.OVERFLOW  Buffer Overflow in Bound String Copy

SV.STRBO.BOUND_COPY.UNTERM  Possible Buffer Overflow in Following String Operations

SV.STRBO.BOUND_SPRINTF  Buffer Overflow in Bound sprintf

SV.STRBO.UNBOUND_COPY  Buffer Overflow in Unbound String Copy

SV.STRBO.UNBOUND_SPRINTF  Buffer Overflow in Unbound sprintf

STR32-C

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.MUST  Buffer Overflow - Non-null Terminated String

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

STR50-CPP

NNTS.MIGHT  Buffer Overflow - Non-null Terminated String

NNTS.TAINTED  Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

WIN00-C

SV.DLLPRELOAD.NONABSOLUTE.DLL  Potential DLL-preload hijack vector

SV.DLLPRELOAD.NONABSOLUTE.EXE  Potential process injection vector

SV.DLLPRELOAD.SEARCHPATH  Do not use SearchPath to find DLLs

WIN30-C

FMM.MIGHT  Freeing Mismatched Memory - possible

FMM.MUST  Freeing Mismatched Memory

Support Summary:

  • 169 rules