(lp0
ccopy_reg
_reconstructor
p1
(c__main__
Hit
p2
c__builtin__
object
p3
Ntp4
Rp5
(dp6
S'category'
p7
S'buffer'
p8
sS'end'
p9
I692
sS'name'
p10
S'gets'
p11
sS'parameters'
p12
(lp13
S''
p14
aS'f'
p15
asS'level'
p16
I5
sS'url'
p17
g14
sS'column'
p18
I2
sS'context_text'
p19
S' gets(f);'
p20
sS'hook'
p21
c__main__
normal
p22
sS'warning'
p23
S'Does not check for buffer overflows (CWE-120, CWE-20)'
p24
sS'suggestion'
p25
S'Use fgets() instead'
p26
sS'input'
p27
I1
sS'line'
p28
I32
sS'filename'
p29
S'test.c'
p30
sS'start'
p31
I688
sbag1
(g2
g3
Ntp32
Rp33
(dp34
g7
g8
sg9
I1462
sg10
S'strncat'
p35
sg12
(lp36
g14
aS'd'
p37
aS's'
p38
aS'sizeof(d)'
p39
asg16
I5
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */'
p40
sS'note'
p41
S'Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left.'
p42
sg21
c__main__
c_strncat
p43
sg23
S'Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120)'
p44
sg25
S'Consider strcat_s, strlcat, snprintf, or automatically resizing strings'
p45
sg28
I60
sg29
g30
sg31
I1455
sbag1
(g2
g3
Ntp46
Rp47
(dp48
g7
g8
sg9
I1539
sg10
S'_tcsncat'
p49
sg12
(lp50
g14
aS'd'
p51
aS's'
p52
aS'sizeof(d)'
p53
asg16
I5
sg17
g14
sg18
I3
sg19
S'  _tcsncat(d,s,sizeof(d)); /* Misuse - flag as riskier */'
p54
sg41
g42
sg21
g43
sg23
g44
sg25
S'Consider strcat_s, strlcat, or automatically resizing strings'
p55
sg28
I61
sg29
g30
sg31
I1531
sbag1
(g2
g3
Ntp56
Rp57
(dp58
g7
g8
sg9
I1680
sg10
S'MultiByteToWideChar'
p59
sg12
(lp60
g14
aS'CP_ACP'
p61
aS'0'
p62
aS'szName'
p63
aS'-1'
p64
aS'wszUserName'
p65
aS'sizeof(wszUserName)'
p66
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName));'
p67
sg41
S'Risk is high, it appears that the size is given as bytes, but the function requires size as characters.'
p68
sg21
c__main__
c_multi_byte_to_wide_char
p69
sg23
S'Requires maximum length in CHARACTERS, not bytes (CWE-120)'
p70
sg25
g14
sg28
I64
sg29
g30
sg31
I1661
sbag1
(g2
g3
Ntp71
Rp72
(dp73
g7
g8
sg9
I1815
sg10
S'MultiByteToWideChar'
p74
sg12
(lp75
g14
aS'CP_ACP'
p76
aS'0'
p77
aS'szName'
p78
aS'-1'
p79
aS'wszUserName'
p80
aS'sizeof wszUserName'
p81
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName);'
p82
sg41
g68
sg21
g69
sg23
g70
sg25
g14
sg28
I66
sg29
g30
sg31
I1796
sbag1
(g2
g3
Ntp83
Rp84
(dp85
g7
S'misc'
p86
sg9
I2533
sg10
S'SetSecurityDescriptorDacl'
p87
sg12
(lp88
g14
aS'&sd'
p89
aS'TRUE'
p90
aS'NULL'
p91
aS'FALSE'
p92
asg16
I5
sg17
g14
sg18
I3
sg31
I2508
sg19
S'  SetSecurityDescriptorDacl(&sd,TRUE,NULL,FALSE);'
p93
sg21
c__main__
c_hit_if_null
p94
sg23
S'Never create NULL ACLs; an attacker can set it to Everyone (Deny All Access), which would even forbid administrator access (CWE-732)'
p95
sg25
g14
sg28
I77
sg29
g30
sS'check_for_null'
p96
I3
sbag84
ag1
(g2
g3
Ntp97
Rp98
(dp99
g7
g8
sg9
I372
sg10
S'strcpy'
p100
sg12
(lp101
g14
aS'b'
p102
aS'a'
p103
asg16
I4
sg17
g14
sg18
I2
sg19
S' strcpy(b, a);'
p104
sg21
c__main__
c_buffer
p105
sg23
S'Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120)'
p106
sg25
S'Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused)'
p107
sg28
I17
sg29
g30
sg31
I366
sbag1
(g2
g3
Ntp108
Rp109
(dp110
g7
g8
sg9
I429
sg10
S'sprintf'
p111
sg12
(lp112
g14
aS's'
p113
aS'"hello %s"'
p114
aS'bug'
p115
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello %s", bug);'
p116
sg21
c__main__
c_sprintf
p117
sg23
S'Does not check for buffer overflows (CWE-120)'
p118
sg25
S'Use sprintf_s, snprintf, or vsnprintf'
p119
sg28
I20
sg29
g30
sg31
I422
sbag1
(g2
g3
Ntp120
Rp121
(dp122
g7
g8
sg9
I459
sg10
S'sprintf'
p123
sg12
(lp124
g14
aS's'
p125
aS'gettext("hello %s")'
p126
aS'bug'
p127
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, gettext("hello %s"), bug);'
p128
sg21
g117
sg23
g118
sg25
g119
sg28
I21
sg29
g30
sg31
I452
sbag1
(g2
g3
Ntp129
Rp130
(dp131
g7
S'format'
p132
sg9
I498
sg10
S'sprintf'
p133
sg12
(lp134
g14
aS's'
p135
aS'unknown'
p136
aS'bug'
p137
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, unknown, bug);'
p138
sg21
g117
sg23
S'Potential format string problem (CWE-134)'
p139
sg25
S'Make format string constant'
p140
sg28
I22
sg29
g30
sg31
I491
sbag1
(g2
g3
Ntp141
Rp142
(dp143
g7
g132
sg9
I524
sg10
S'printf'
p144
sg12
(lp145
g14
aS'bf'
p146
aS'x'
p147
asg16
I4
sg17
g14
sg18
I2
sg19
S' printf(bf, x);'
p148
sg21
c__main__
c_printf
p149
sg23
S'If format strings can be influenced by an attacker, they can be exploited (CWE-134)'
p150
sg25
S'Use a constant for the format specification'
p151
sg28
I23
sg29
g30
sg31
I518
sbag1
(g2
g3
Ntp152
Rp153
(dp154
g7
g8
sg9
I557
sg10
S'scanf'
p155
sg12
(lp156
g14
aS'"%s"'
p157
aS's'
p158
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p159
sg21
c__main__
c_scanf
p160
sg23
S"The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20)"
p161
sg25
S'Specify a limit to %s, or use a different input function'
p162
sg27
I1
sg28
I25
sg29
g30
sg31
I552
sbag1
(g2
g3
Ntp163
Rp164
(dp165
g7
g8
sg9
I593
sg10
S'scanf'
p166
sg12
(lp167
g14
aS'"%s"'
p168
ag158
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p169
sg21
g160
sg23
g161
sg25
g162
sg27
I1
sg28
I27
sg29
g30
sg31
I588
sbag1
(g2
g3
Ntp170
Rp171
(dp172
g7
g132
sg9
I997
sg10
S'syslog'
p173
sg12
(lp174
g14
aS'LOG_ERR'
p175
aS'attacker_string'
p176
asg16
I4
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR, attacker_string);'
p177
sg21
g149
sS'format_position'
p178
I2
sg23
S"If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134)"
p179
sg25
S'Use a constant format string for syslog'
p180
sg28
I38
sg29
g30
sg31
I991
sbag1
(g2
g3
Ntp181
Rp182
(dp183
g7
g8
sg9
I1088
sg10
S'_mbscpy'
p184
sg12
(lp185
g14
aS'd'
p186
aS's'
p187
asg16
I4
sg17
g14
sg18
I3
sg19
S"  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */"
p188
sg21
g105
sg23
g106
sg25
S'Consider using a function version that stops copying at the end of the buffer'
p189
sg28
I49
sg29
g30
sg31
I1081
sbag1
(g2
g3
Ntp190
Rp191
(dp192
g7
g8
sg9
I1394
sg10
S'lstrcat'
p193
sg12
(lp194
g14
aS'd'
p195
aS's'
p196
asg16
I4
sg17
g14
sg18
I3
sg19
S'  lstrcat(d,s);'
p197
sg21
g105
sg23
S'Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120)'
p198
sg25
g14
sg28
I56
sg29
g30
sg31
I1387
sbag1
(g2
g3
Ntp199
Rp200
(dp201
g7
S'shell'
p202
sg9
I2634
sg10
S'CreateProcess'
p203
sg12
(lp204
g14
aS'NULL'
p205
aS'"C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x"'
p206
aS'""'
p207
asg16
I3
sg17
g14
sg18
I3
sg31
I2621
sg19
S'  CreateProcess(NULL, "C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x", "");'
p208
sg21
g94
sg23
S'This causes a new process to execute and is difficult to use safely (CWE-78)'
p209
sg25
S'Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run'
p210
sg28
I79
sg29
g30
sg96
I1
sbag200
ag1
(g2
g3
Ntp211
Rp212
(dp213
g7
g8
sg9
I3057
sg10
S'getopt_long'
p214
sg12
(lp215
g14
aS'argc'
p216
aS'argv'
p217
aS'"a"'
p218
aS'longopts'
p219
aS'NULL'
p220
asg16
I3
sg17
S'dangers-c'
p221
sg18
I20
sg19
S'    while ((optc = getopt_long (argc, argv, "a",longopts, NULL )) != EOF) {'
p222
sg21
g22
sg23
S'Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20)'
p223
sg25
S'Check implementation on installation, or limit the size of all string inputs'
p224
sg27
I1
sg28
I95
sg29
g30
sg31
I3046
sbag1
(g2
g3
Ntp225
Rp226
(dp227
g7
g8
sg9
I318
sg10
S'strcpy'
p228
sg12
(lp229
g14
aS'a'
p230
aS'gettext("Hello there")'
p231
asg16
I2
sg17
g14
sg18
I2
sg19
S' strcpy(a, gettext("Hello there")); // Did this work?'
p232
sg41
S'Risk is low because the source is a constant string.'
p233
sg21
g105
sg23
g106
sg25
g107
sg28
I16
sg29
g30
sg31
I312
sbag1
(g2
g3
Ntp234
Rp235
(dp236
g7
g8
sg9
I407
sg10
S'sprintf'
p237
sg12
(lp238
g14
aS's'
p239
aS'"hello"'
p240
asg16
I2
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello");'
p241
sg41
S'Risk is low because the source has a constant maximum length.'
p242
sg21
g117
sg23
g118
sg25
g119
sg28
I19
sg29
g30
sg31
I400
sbag1
(g2
g3
Ntp243
Rp244
(dp245
g7
g8
sg29
g30
sg9
I1047
sg10
S'char'
p246
sg12
(lp247
sg16
I2
sg17
g14
sS'lookahead'
p248
S"char d[20];\n  char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s); // fail - no size\n  memcpy(d, s, sizeof(d)); // pass\n  memcpy(& n, s, sizeof( n )); // pass\n  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination\n  memcpy(d,s,n); // fail - size unguessable\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s"
p249
sg18
I3
sg19
S'  char d[20];'
p250
sg21
c__main__
c_static_array
p251
sg23
S'Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120)'
p252
sg25
S'Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length'
p253
sg28
I45
sS'extract_lookahead'
p254
I1
sg31
I1043
sbag1
(g2
g3
Ntp255
Rp256
(dp257
g7
g8
sg29
g30
sg9
I1061
sg10
S'char'
p258
sg12
(lp259
sg16
I2
sg17
g14
sg248
S"char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s); // fail - no size\n  memcpy(d, s, sizeof(d)); // pass\n  memcpy(& n, s, sizeof( n )); // pass\n  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination\n  memcpy(d,s,n); // fail - size unguessable\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s,sizeof(d)); /"
p260
sg18
I3
sg19
S'  char s[20];'
p261
sg21
g251
sg23
g252
sg25
g253
sg28
I46
sg254
I1
sg31
I1057
sbag1
(g2
g3
Ntp262
Rp263
(dp264
g7
g8
sg9
I1161
sg10
S'memcpy'
p265
sg12
(lp266
g14
aS'd'
p267
aS's'
p268
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(d,s); // fail - no size'
p269
sg21
c__main__
c_memcpy
p270
sg23
S'Does not check for buffer overflows when copying to destination (CWE-120)'
p271
sg25
S'Make sure destination can always hold the source data'
p272
sg28
I50
sg29
g30
sg31
I1155
sbag1
(g2
g3
Ntp273
Rp274
(dp275
g7
g8
sg9
I1268
sg10
S'memcpy'
p276
sg12
(lp277
g14
aS'&n'
p278
aS's'
p279
aS'sizeof(s)'
p280
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination'
p281
sg21
g270
sg23
g271
sg25
g272
sg28
I53
sg29
g30
sg31
I1262
sbag1
(g2
g3
Ntp282
Rp283
(dp284
g7
g8
sg9
I1330
sg10
S'memcpy'
p285
sg12
(lp286
g14
aS'd'
p287
aS's'
p288
aS'n'
p289
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(d,s,n); // fail - size unguessable'
p290
sg21
g270
sg23
g271
sg25
g272
sg28
I54
sg29
g30
sg31
I1324
sbag1
(g2
g3
Ntp291
Rp292
(dp293
g7
g8
sg9
I1378
sg10
S'CopyMemory'
p294
sg12
(lp295
g14
aS'd'
p296
aS's'
p297
asg16
I2
sg17
g14
sg18
I3
sg19
S'  CopyMemory(d,s);'
p298
sg21
g270
sg23
g271
sg25
g272
sg28
I55
sg29
g30
sg31
I1368
sbag1
(g2
g3
Ntp299
Rp300
(dp301
g7
g86
sg9
I3151
sg10
S'fopen'
p302
sg12
(lp303
g14
aS'"/etc/passwd"'
p304
aS'"r"'
p305
asg16
I2
sg17
g14
sg18
I7
sg19
S'  f = fopen("/etc/passwd", "r"); '
p306
sg21
g22
sg23
S'Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362)'
p307
sg25
g14
sg28
I101
sg29
g30
sg31
I3146
sbag1
(g2
g3
Ntp308
Rp309
(dp310
g7
g8
sg9
I282
sg10
S'strcpy'
p311
sg12
(lp312
g14
aS'a'
p313
aS'"\\n"'
p314
asg16
I1
sg17
g14
sg18
I2
sg19
S' strcpy(a, "\\n"); // Did this work?'
p315
sg41
S'Risk is low because the source is a constant character.'
p316
sg21
g105
sg23
g106
sg25
g107
sg28
I15
sg29
g30
sg31
I276
sbag1
(g2
g3
Ntp317
Rp318
(dp319
g7
g8
sg9
I388
sg10
S'sprintf'
p320
sg12
(lp321
g14
aS's'
p322
aS'"\\n"'
p323
asg16
I1
sg17
g14
sg18
I2
sg19
S' sprintf(s, "\\n");'
p324
sg41
S'Risk is low because the source is a constant character.'
p325
sg21
g117
sg23
g118
sg25
g119
sg28
I18
sg29
g30
sg31
I381
sbag1
(g2
g3
Ntp326
Rp327
(dp328
g7
g8
sg9
I574
sg10
S'scanf'
p329
sg12
(lp330
g14
aS'"%10s"'
p331
ag158
asg16
I1
sg17
g14
sg18
I2
sg19
S' scanf("%10s", s);'
p332
sg21
g160
sg23
S"It's unclear if the %s limit in the format string is small enough (CWE-120)"
p333
sg25
S'Check that the limit is sufficiently small, or use a different input function'
p334
sg27
I1
sg28
I26
sg29
g30
sg31
I569
sbag1
(g2
g3
Ntp335
Rp336
(dp337
g7
g8
sg9
I1410
sg10
S'strncpy'
p338
sg12
(lp339
g14
aS'd'
p340
aS's'
p341
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncpy(d,s);'
p342
sg21
g105
sg23
S"Easily used incorrectly; doesn't always \\0-terminate or check for invalid pointers [MS-banned] (CWE-120)"
p343
sg25
g14
sg28
I57
sg29
g30
sg31
I1403
sbag1
(g2
g3
Ntp344
Rp345
(dp346
g7
g8
sg9
I1427
sg10
S'_tcsncpy'
p347
sg12
(lp348
g14
aS'd'
p349
aS's'
p350
asg16
I1
sg17
g14
sg18
I3
sg19
S'  _tcsncpy(d,s);'
p351
sg21
g105
sg23
g343
sg25
g14
sg28
I58
sg29
g30
sg31
I1419
sbag1
(g2
g3
Ntp352
Rp353
(dp354
g7
g8
sg9
I1443
sg10
S'strncat'
p355
sg12
(lp356
g14
aS'd'
p357
aS's'
p358
aS'10'
p359
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,10);'
p360
sg21
g43
sg23
g44
sg25
g45
sg28
I59
sg29
g30
sg31
I1436
sbag1
(g2
g3
Ntp361
Rp362
(dp363
g7
g8
sg9
I1599
sg10
S'strlen'
p364
sg12
(lp365
g14
aS'd'
p366
asg16
I1
sg17
g14
sg18
I7
sg19
S'  n = strlen(d);'
p367
sg21
g22
sg23
S'Does not handle strings that are not \\0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126)'
p368
sg25
g14
sg28
I62
sg29
g30
sg31
I1593
sbag1
(g2
g3
Ntp369
Rp370
(dp371
g7
g8
sg9
I1918
sg10
S'MultiByteToWideChar'
p372
sg12
(lp373
g14
aS'CP_ACP'
p374
aS'0'
p375
aS'szName'
p376
aS'-1'
p377
aS'wszUserName'
p378
aS'sizeof(wszUserName)/sizeof(wszUserName[0])'
p379
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName)/sizeof(wszUserName[0]));'
p380
sg41
S'Risk is very low, the length appears to be in characters not bytes.'
p381
sg21
g69
sg23
g70
sg25
g14
sg28
I68
sg29
g30
sg31
I1899
sbag1
(g2
g3
Ntp382
Rp383
(dp384
g7
g8
sg9
I2045
sg10
S'MultiByteToWideChar'
p385
sg12
(lp386
g14
aS'CP_ACP'
p387
aS'0'
p388
aS'szName'
p389
aS'-1'
p390
aS'wszUserName'
p391
aS'sizeof wszUserName /sizeof(wszUserName[0])'
p392
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName /sizeof(wszUserName[0]));'
p393
sg41
g381
sg21
g69
sg23
g70
sg25
g14
sg28
I70
sg29
g30
sg31
I2026
sbag1
(g2
g3
Ntp394
Rp395
(dp396
g7
g132
sg9
I200
sg10
S'printf'
p397
sg12
(lp398
g14
aS'"hello\\n"'
p399
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("hello\\n");'
p400
sg41
S'Constant format string, so not considered risky.'
p401
sg21
g149
sg23
g150
sg25
g151
sg28
I9
sg29
g30
sg31
I194
sbag1
(g2
g3
Ntp402
Rp403
(dp404
g7
g8
sg9
I539
sg10
S'scanf'
p405
sg12
(lp406
g14
aS'"%d"'
p407
aS'&x'
p408
asg16
I0
sg17
g14
sg18
I2
sg19
S' scanf("%d", &x);'
p409
sg41
S'No risky scanf format detected.'
p410
sg21
g160
sg23
g161
sg25
g162
sg27
I1
sg28
I24
sg29
g30
sg31
I534
sbag1
(g2
g3
Ntp411
Rp412
(dp413
g7
g132
sg9
I643
sg10
S'printf'
p414
sg12
(lp415
g14
aS'"\\\\"'
p416
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("\\\\");'
p417
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I29
sg29
g30
sg31
I637
sbag1
(g2
g3
Ntp418
Rp419
(dp420
g7
g132
sg9
I837
sg10
S'syslog'
p421
sg12
(lp422
g14
aS'LOG_ERR'
p423
aS'"cannot open config file (%s): %s"'
p424
aS'filename'
p425
aS'strerror(errno)'
p426
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR,"cannot open config file (%s): %s",filename,strerror(errno))'
p427
sg41
g401
sg21
g149
sg178
I2
sg23
g179
sg25
g180
sg28
I35
sg29
g30
sg31
I831
sbag1
(g2
g3
Ntp428
Rp429
(dp430
g7
g132
sg9
I914
sg10
S'syslog'
p431
sg12
(lp432
g14
aS'LOG_CRIT'
p433
aS'"malloc() failed"'
p434
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_CRIT,"malloc() failed");'
p435
sg41
g401
sg21
g149
sg178
I2
sg23
g179
sg25
g180
sg28
I36
sg29
g30
sg31
I908
sbag1
(g2
g3
Ntp436
Rp437
(dp438
g7
g132
sg9
I2745
sg10
S'printf'
p439
sg12
(lp440
g14
aS'"%c\\n"'
p441
aS"'x'"
p442
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'x\');'
p443
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I81
sg29
g30
sg31
I2739
sbag1
(g2
g3
Ntp444
Rp445
(dp446
g7
g132
sg9
I2768
sg10
S'printf'
p447
sg12
(lp448
g14
aS'"%c\\n"'
p449
aS'\'"\''
p450
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'"\');'
p451
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I82
sg29
g30
sg31
I2762
sbag1
(g2
g3
Ntp452
Rp453
(dp454
g7
g132
sg9
I2791
sg10
S'printf'
p455
sg12
(lp456
g14
aS'"%c\\n"'
p457
aS'\'\\"\''
p458
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\"\');'
p459
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I83
sg29
g30
sg31
I2785
sbag1
(g2
g3
Ntp460
Rp461
(dp462
g7
g132
sg9
I2815
sg10
S'printf'
p463
sg12
(lp464
g14
aS'"%c\\n"'
p465
aS"'\\''"
p466
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\'\');'
p467
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I84
sg29
g30
sg31
I2809
sbag1
(g2
g3
Ntp468
Rp469
(dp470
g7
g132
sg9
I2839
sg10
S'printf'
p471
sg12
(lp472
g14
aS'"%c\\n"'
p473
aS"'\\177'"
p474
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\177\');'
p475
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I85
sg29
g30
sg31
I2833
sbag1
(g2
g3
Ntp476
Rp477
(dp478
g7
g132
sg9
I2865
sg10
S'printf'
p479
sg12
(lp480
g14
aS'"%c\\n"'
p481
aS"'\\xfe'"
p482
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xfe\');'
p483
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I86
sg29
g30
sg31
I2859
sbag1
(g2
g3
Ntp484
Rp485
(dp486
g7
g132
sg9
I2891
sg10
S'printf'
p487
sg12
(lp488
g14
aS'"%c\\n"'
p489
aS"'\\xd'"
p490
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xd\');'
p491
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I87
sg29
g30
sg31
I2885
sbag1
(g2
g3
Ntp492
Rp493
(dp494
g7
g132
sg9
I2916
sg10
S'printf'
p495
sg12
(lp496
g14
aS'"%c\\n"'
p497
aS"'\\n'"
p498
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\n\');'
p499
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I88
sg29
g30
sg31
I2910
sbag1
(g2
g3
Ntp500
Rp501
(dp502
g7
g132
sg9
I2940
sg10
S'printf'
p503
sg12
(lp504
g14
aS'"%c\\n"'
p505
aS"'\\\\'"
p506
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\\\');'
p507
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I89
sg29
g30
sg31
I2934
sbag1
(g2
g3
Ntp508
Rp509
(dp510
g7
g132
sg9
I2964
sg10
S'printf'
p511
sg12
(lp512
g14
aS'"%c\\n"'
p513
aS'"\'"'
p514
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", "\'");'
p515
sg41
g401
sg21
g149
sg23
g150
sg25
g151
sg28
I90
sg29
g30
sg31
I2958
sbag1
(g2
g3
Ntp516
Rp517
(dp518
g7
g132
sg9
I3289
sg10
S'fprintf'
p519
sg12
(lp520
g14
aS'stderr'
p521
aS'"Assertion failed.\\n"\\\n "File: %s\\nLine: %d\\n"\\\n "Assertion: %s\\n\\n"'
p522
aS'__FILE__'
p523
aS'__LINE__'
p524
aS'#x'
p525
asg16
I0
sg17
g14
sg18
I2
sg19
S' fprintf(stderr,"Assertion failed.\\n"\\'
p526
sg41
g401
sg21
g149
sg178
I2
sg23
g150
sg25
g151
sg28
I109
sg29
g30
sg31
I3282
sba.