Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Care must be taken to ensure that the size is valid for the array. If these parameters can be manipulated by an attacker, this function will almost always result in an exploitable vulnerability.

References