Maxim Integrated's IoT development kit.

Dependencies:   MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice

Committer:
Mahir Ozturk
Date:
Tue Mar 13 14:52:59 2018 +0300
Revision:
1:efe9cad8942f
Commit project files

Change-Id: I2188228f2a27e9a13e2407846e48b38c2596caa0

Who changed what in which revision?

UserRevisionLine numberNew contents of line
Mahir Ozturk 1:efe9cad8942f 1 // Functions known to cause issues in C/C++ code.
Mahir Ozturk 1:efe9cad8942f 2 // To add new issues use the format: function name[=>][[N]][description]
Mahir Ozturk 1:efe9cad8942f 3 // (where N is a severity rating of 1 (Critical) to 3 (Medium) (or optionally, 0 for 'normal'))
Mahir Ozturk 1:efe9cad8942f 4 //
Mahir Ozturk 1:efe9cad8942f 5 // NB - function names are case-sensitive for this file
Mahir Ozturk 1:efe9cad8942f 6 //
Mahir Ozturk 1:efe9cad8942f 7 // MS banned string copy functions and replacements
Mahir Ozturk 1:efe9cad8942f 8 strcpyA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 9 strcpyW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 10 strcpy =>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 11 strcpy(=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 12 StrCpyNA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 13 StrCpyNW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 14 StrCpyN=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 15 StrNCpyA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 16 StrNCpyW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 17 StrNCpy=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 18 strcpynA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 19 strncpy =>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 20 strncpy(=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 21
Mahir Ozturk 1:efe9cad8942f 22 // MS banned string concatenation functions and replacements
Mahir Ozturk 1:efe9cad8942f 23 strcatA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 24 strcatW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 25 strcat =>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 26 strcat(=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 27 StrCatA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 28 StrCatW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 29 StrCat=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 30 lstrcatA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 31 lstrcatW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 32 lstrcat=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 33 StrCatBuffA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 34 StrCatBuffW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 35 StrCatBuff=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 36 lstrcatnA=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 37 lstrcatnW=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 38 lstrcatn=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 39 lstrncat=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 40 strncat =>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 41 strncat(=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions. While 'safer', the current "n" functions include non-null termination of overflowed buffers and no error returns on overflow.
Mahir Ozturk 1:efe9cad8942f 42
Mahir Ozturk 1:efe9cad8942f 43 // MS banned string tokenizing functions and replacements
Mahir Ozturk 1:efe9cad8942f 44 strtok =>Function appears in Microsoft's banned function list. Function is not always thread-safe and can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 45 strtok(=>Function appears in Microsoft's banned function list. Function is not always thread-safe and can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 46 _tcstok=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 47 wcstok=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 48 _mbstok=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions.
Mahir Ozturk 1:efe9cad8942f 49
Mahir Ozturk 1:efe9cad8942f 50 // MS banned Makepath/Splitpath functions and replacements
Mahir Ozturk 1:efe9cad8942f 51 makepath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 52 (makepath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 53 _tmakepath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 54 _makepath(=>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 55 _wmakepath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 56 _splitpath =>Function appears in Microsoft's banned function list. Use the safe alternative, '_makepath_s'.
Mahir Ozturk 1:efe9cad8942f 57 _splitpath(=>Function appears in Microsoft's banned function list. Use the safe alternative, '_splitpath_s'.
Mahir Ozturk 1:efe9cad8942f 58 _tsplitpath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_splitpath_s'.
Mahir Ozturk 1:efe9cad8942f 59 _wsplitpath=>Function appears in Microsoft's banned function list. Use the safe alternative, '_splitpath_s'.
Mahir Ozturk 1:efe9cad8942f 60
Mahir Ozturk 1:efe9cad8942f 61 // MS banned numeric conversion functions and replacements
Mahir Ozturk 1:efe9cad8942f 62 _itoa=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 63 _itow=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 64 _i64toa=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 65 _i64tow=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 66 _ui64toa=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 67 _ui64tot=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 68 _ui64tow=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 69 _ultoa=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 70 _ultot=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 71 _ultow=>Function appears in Microsoft's banned function list. It does not perform a safe conversion on account of a failure to distinguish between 'signed' and 'unsigned'.
Mahir Ozturk 1:efe9cad8942f 72
Mahir Ozturk 1:efe9cad8942f 73 // MS banned scanf functions and replacements
Mahir Ozturk 1:efe9cad8942f 74 scanf=>[2]Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 75 (scanf=>[2]Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 76 fscanf=>[2]Function appears in Microsoft's banned function list. The function directs external input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 77 wscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 78 _tscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 79 sscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 80 swscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 81 _stscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 82 snscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 83 snwscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 84 _sntscanf=>Function appears in Microsoft's banned function list. The function directs user defined input to a buffer and so can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 85
Mahir Ozturk 1:efe9cad8942f 86 // MS banned gets functions and replacements
Mahir Ozturk 1:efe9cad8942f 87 gets=>[2]Function appears in Microsoft's banned function list. Since the function reads characters from STDIN and writes to buffer until EOL it can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 88 (gets=>[2]Function appears in Microsoft's banned function list. Since the function reads characters from STDIN and writes to buffer until EOL it can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 89 _getts=>[2]Function appears in Microsoft's banned function list. Since the function reads characters from STDIN and writes to buffer until EOL it can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 90 _gettws=>[2]Function appears in Microsoft's banned function list. Since the function reads characters from STDIN and writes to buffer until EOL it can facilitate buffer overflows.
Mahir Ozturk 1:efe9cad8942f 91
Mahir Ozturk 1:efe9cad8942f 92 // MS banned string length functions
Mahir Ozturk 1:efe9cad8942f 93 strlen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 94 (strlen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 95 wcslen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 96 _mbslen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 97 _mbstrlen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 98 StrLen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 99 lstrlen=>Function appears in Microsoft's banned function list. For critical applications, particularly applications accepting anonymous Internet connections or unverified input data, strlen and similar functions can become victims of integer overflow or 'wraparound' errors.
Mahir Ozturk 1:efe9cad8942f 100
Mahir Ozturk 1:efe9cad8942f 101 // MS banned memory copy functions and replacements
Mahir Ozturk 1:efe9cad8942f 102 wmemcpy=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 103 memcpy=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 104 (memcpy=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 105 RtlCopyMemory=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 106 CopyMemory=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 107 (CopyMemory=>[3]Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 108
Mahir Ozturk 1:efe9cad8942f 109 // MS banned stack dynamic memory allocation functions and replacements
Mahir Ozturk 1:efe9cad8942f 110 alloca=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 111 _alloca=>Function appears in Microsoft's banned function list. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 112
Mahir Ozturk 1:efe9cad8942f 113 // Unrestricted memory manipulation
Mahir Ozturk 1:efe9cad8942f 114 memmove=>Unrestricted memory copy function. Can facilitate buffer overflow conditions and other memory mis-management situations.
Mahir Ozturk 1:efe9cad8942f 115 realloc=>Unrestricted memory resize function. Use of realloc can expose residual memory contents or render existing buffers impossible to securely erase. Do not use realloc on memory intended to be secure as the old structure will not be zeroed out.
Mahir Ozturk 1:efe9cad8942f 116
Mahir Ozturk 1:efe9cad8942f 117 // *printf family
Mahir Ozturk 1:efe9cad8942f 118 sprintf=>[3]Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 119 _snprintf=>Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 120 _swprintf=>Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 121 _sntprintf=>Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 122 nsprintf=>Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 123 vsprintf=>Function appears in Microsoft's banned function list. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 124 std_strlprintf=>Function is generally safe but will result in buffer overflows if destination is not checked for zero length. Can facilitate format string bugs.
Mahir Ozturk 1:efe9cad8942f 125
Mahir Ozturk 1:efe9cad8942f 126 // MS banned IsBad* functions
Mahir Ozturk 1:efe9cad8942f 127 IsBadWritePtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 128 IsBadHugeWritePtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 129 IsBadReadPtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 130 IsBadHugeReadPtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 131 IsBadCodePtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 132 IsBadStringPtr=>Function appears in Microsoft's banned function list. Can mask errors during pointer assignment, resulting in memory leaks, crashes and unstable behaviour.
Mahir Ozturk 1:efe9cad8942f 133
Mahir Ozturk 1:efe9cad8942f 134 // File handling
Mahir Ozturk 1:efe9cad8942f 135 _wfopen=>Function used to open file. Carry out a manual check to ensure that user cannot modify filename for malicious purposes and that file is not 'opened' more than once simultaneously.
Mahir Ozturk 1:efe9cad8942f 136 _wopen=>Function used to open file. Carry out a manual check to ensure that user cannot modify filename for malicious purposes and that file is not 'opened' more than once simultaneously.
Mahir Ozturk 1:efe9cad8942f 137 fopen=>Function used to open file. Carry out a manual check to ensure that user cannot modify filename for malicious purposes and that file is not 'opened' more than once simultaneously.
Mahir Ozturk 1:efe9cad8942f 138 _open=>Function used to open file. Carry out a manual check to ensure that user cannot modify filename for malicious purposes and that file is not 'opened' more than once simultaneously.
Mahir Ozturk 1:efe9cad8942f 139
Mahir Ozturk 1:efe9cad8942f 140 // 'considered harmful'
Mahir Ozturk 1:efe9cad8942f 141 goto =>[3]Use of 'goto' function. The goto function can result in unstructured code which is difficult to maintain and can result in failures to initialise or de-allocate memory.
Mahir Ozturk 1:efe9cad8942f 142 LoadLibrary=>[2]The function searches several paths for a library if called with a filename, but no path. This can allow trojan DLLs to be deployed, regardless of the presence of the correct DLL. Manually check the code to ensure that the full path is specified.
Mahir Ozturk 1:efe9cad8942f 143 EnterCriticalSection=>[3]This function can throw exceptions when limited memory is available, resulting in unstable behaviour and potential DoS conditions. Use the safer InitialCriticalSectionAndSpinCount function.
Mahir Ozturk 1:efe9cad8942f 144 rewind=>[3]The 'rewind' function is considered unsafe and obsolete. Using rewind() makes it impossible to determine if the file position indicator was set back to the beginning of the file, potentially resulting in improper control flow. fseek() is considered a safer alternative.
Mahir Ozturk 1:efe9cad8942f 145 umask=>[3]Manually check this function to ensure that safe privilege levels are being applied.
Mahir Ozturk 1:efe9cad8942f 146 catgets=>[3]This function may use the NLSPATH environment variable. Environment variables may be within the control of the end user and should be handled with caution. Manually check the code to ensure that the return value is checked for malicious content and is truncated, where appropriate.
Mahir Ozturk 1:efe9cad8942f 147 getenv=>[3]Environment variables may be within the control of the end user and should be handled with caution. Manually check the code to ensure that the return value is checked for malicious content and is truncated, where appropriate.
Mahir Ozturk 1:efe9cad8942f 148 gethostbyname=>[3]Environment variables may be within the control of the end user and should be handled with caution. Manually check the code to ensure that the return value is checked for malicious content and is truncated, where appropriate.
Mahir Ozturk 1:efe9cad8942f 149 ChangeWindowMessageFilter=>The use of this function is now discouraged. It has process-wide scope and ChangeWindowMessageFilterEx should be used as a safe replacement.
Mahir Ozturk 1:efe9cad8942f 150 _strlwr =>Function is deprecated. Use the safer version, _strlwr_s.
Mahir Ozturk 1:efe9cad8942f 151 _strlwr(=>Function is deprecated. Use the safer version, _strlwr_s.
Mahir Ozturk 1:efe9cad8942f 152 _strupr =>Function is deprecated. Use the safer version, _strupr_s.
Mahir Ozturk 1:efe9cad8942f 153 _strupr(=>Function is deprecated. Use the safer version, _strupr_s.
Mahir Ozturk 1:efe9cad8942f 154 setbuf=>Allows data to be read from a file/stream. Use with caution and do not allow user defined streams where possible. Conduct a manual check to ensure data is handled in a safe manner.
Mahir Ozturk 1:efe9cad8942f 155 assert=>[3]The 'assert' macro usually only exists for code in the debug build. In general, no check will take place in production code. Verify that this check does not perform any critical function and is not being used in place of error handling.