Don’t Shoot Yourself in the Foot When Handling Input Data

The linking concept of today's article differs from usual. This time it is not one project, the source code of which was analyzed, but a number of warnings related to one and the same diagnostic rule in several projects. What's interesting about this? The point is that some of the considered code fragments contain errors reproduced when working with the application and other fragments even represent vulnerabilities (CVE). In addition, at the end of the article, you will find a small talk on security defects.

Brief Preface

All errors we will look at in this article have a similar pattern: