4 lines
261 B
Plaintext
4 lines
261 B
Plaintext
![]() |
The following code is vulnerable to a memory allocation injection because
|
||
|
the size of a memory allocation is determined using a user-controlled source.
|
||
|
It then performs the actual allocation without any verification or other
|
||
|
sanitization over the provided size.
|