|
| 1 | +Error: SNYK_CODE_WARNING (CWE-290): |
| 2 | +vendor/krb5-src/krb5/src/lib/krb5/krb/t_princ.c:381:26: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker. |
| 3 | + |
| 4 | +Error: SNYK_CODE_WARNING (CWE-290): |
| 5 | +vendor/krb5-src/krb5/src/wconfig.c:140:21: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker. |
| 6 | + |
| 7 | +Error: SNYK_CODE_WARNING (CWE-290): |
| 8 | +vendor/krb5-src/krb5/src/wconfig.c:145:21: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker. |
| 9 | + |
| 10 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 11 | +vendor/sasl2-sys/sasl2/utils/smtptest.c:360:3: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 12 | + |
| 13 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 14 | +vendor/krb5-src/krb5/src/tests/asn.1/trval.c:161:19: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 15 | + |
| 16 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 17 | +vendor/krb5-src/krb5/src/tests/asn.1/trval.c:161:30: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 18 | + |
| 19 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 20 | +vendor/rdkafka-sys/librdkafka/tests/0098-consumer-txn.cpp:307:35: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 21 | + |
| 22 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 23 | +vendor/rdkafka-sys/librdkafka/tests/0098-consumer-txn.cpp:444:7: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 24 | + |
| 25 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 26 | +vendor/lz4-sys/liblz4/tests/abiTest.c:81:27: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 27 | + |
| 28 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 29 | +vendor/krb5-src/krb5/src/tests/asn.1/trval.c:126:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 30 | + |
| 31 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 32 | +vendor/krb5-src/krb5/src/tests/asn.1/trval.c:128:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 33 | + |
| 34 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 35 | +vendor/krb5-src/krb5/src/tests/asn.1/trval.c:130:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 36 | + |
| 37 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 38 | +vendor/openssl-src/openssl/test/confdump.c:37:25: note[cpp/IntegerOverflow/test]: Unsanitized input from a command line argument flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
| 39 | + |
| 40 | +Error: SNYK_CODE_WARNING (CWE-190): |
| 41 | +vendor/lz4-sys/liblz4/tests/fuzzer.c:378:95: note[cpp/IntegerOverflow/test]: Unsanitized input from a command line argument flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability. |
0 commit comments