...
Recommendation | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
API00-C | Medium | Unlikely | No | HighNo | P2 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| Supported | |||||||||||
| CodeSonar |
| LANG.STRUCT.UPD | Unchecked parameter dereference | ||||||||||
| Parasoft C/C++test |
| CODSTA-86 | Polyspace Bug Finder | R2016a | Invalid use of standard library memory routine Invalid use of standard library routine Invalid use of standard library string routine | CERT_C-API00-a | The validity of parameters must be checked inside each function | ||||||
| PC-lint Plus |
| 413, 613, 668 | Partially supported: reports use of null pointers including function parameters which are assumed to have the potential to be null | ||||||||||
| PVS-Studio |
| V781, V1111 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...