 
                            ...
Failure to follow this recommendation can result in improper memory accesses and buffer overflows that are detrimental to the correct and continued execution of the program.
| Rule | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| API02-C | High | Likely | High | P9 | L2 | 
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar | 
 | BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||
| Parasoft C/C++test | 
 | 
| 
 | 
| 
 | SECURITY- | 
| 12, SECURITY- | 
| 07 | |||
| Polyspace Bug Finder | R2016a | Array access with tainted index | Functions that read or write to or from an array should take an argument to specify the source or target size | 
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Key here (explains table format and definitions)
| Taxonomy | Taxonomy item | Relationship | 
|---|
Bibliography
| [ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces | 
...
...