...
Include Page | ||||
---|---|---|---|---|
|
Risk Assessment
Copying data to a buffer that is too small to hold that data results in a buffer overflow. Attackers can use this to execute arbitrary code.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
STR32-C | 3 (medium) | 3 (probable) | 2 (medium) | P18 | L1 |
...