SYM_C_0009 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki
Use of Potentially Dangerous Function
Property | Value |
---|---|
Language | |
Severity | |
CWE | CWE-676: Use of Potentially Dangerous Function |
Confidence Level | Low |
Impact Level | High |
Likelihood Level | Low |
Description
Using 'scanf()' to read input can easily lead to buffer overflows because it doesn't limit how much data is read into a buffer. This makes your code unsafe, especially when handling user input.
Impact
If exploited, an attacker could provide input that overflows the buffer, potentially allowing them to crash the program, corrupt memory, or execute malicious code. This can lead to serious security breaches, including system compromise or data leaks.