Skip to main content
Glama
posix-buffer-overflow.cpp660 B
char array[10]; initialize(array); void *pos = memchr(array, '@', 42); // Noncompliant, buffer overflow that could expose sensitive data // OWASP Top 10 2017 Category A9 - Using Components with Known Vulnerabilities // MITRE, CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer // MITRE, CWE-131 - Incorrect Calculation of Buffer Size // MITRE, CWE-788 - Access of Memory Location After End of Buffer // CERT, ARR30-C. - Do not form or use out-of-bounds pointers or array subscripts // CERT, STR50-CPP. - Guarantee that storage for strings has sufficient space for character data and the null terminator

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/michoo/security_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server