Skip to content

analysis with www.deepcode.ai #3907

Closed
Closed
@fix27

Description

@fix27

Describe the problem
Unsanitized input flows from a command line argument and is used in usleep. This may allow an attacker to perform a denial of service attack.

Unsanitized input flows from a command line argument and is used to manipulate a buffer (in strcpy). This may result in a buffer overflow vulnerability.

The usage of regex in replace will change only the first match. Consider using a regular expression with the global replacement flag (/g).

typeof is compared to undefined. This comparison is invalid, because typeof always returns strings.

Describe the solution you'd like
www.deepcode.ai
73 SUGGESTIONS
Critical: 4
Warning: 43
Info: 26

Additional context
antique_file_deleter.cpp ( usleep(antique_usleep); )
create_work.cpp ( strcpy(jd.wu.keywords, argv[++i]); )
color_picker.js (value.replace(/\s+/, ''))
plugin.js (typeof(element.children[x].attributes.width) != undefined))

Metadata

Metadata

Assignees

No one assigned

    Labels

    T: InformationalInformation only, no code changes required

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions