René's URL Explorer Experiment


Title: Heap Use After Free Vulnerability · Issue #11 · CodeIntelligenceTesting/c-cpp-example · GitHub

Open Graph Title: Heap Use After Free Vulnerability · Issue #11 · CodeIntelligenceTesting/c-cpp-example

X Title: Heap Use After Free Vulnerability · Issue #11 · CodeIntelligenceTesting/c-cpp-example

Description: Detected Heap Use After Free Vulnerability in src/explore_me/explore_me.cpp:49:3 SEVERITY 8.0 DESCRIPTION A heap use after free is the use of memory locations that has been allocated during the program execution then freed. For example, ...

Open Graph Description: Detected Heap Use After Free Vulnerability in src/explore_me/explore_me.cpp:49:3 SEVERITY 8.0 DESCRIPTION A heap use after free is the use of memory locations that has been allocated during the pro...

X Description: Detected Heap Use After Free Vulnerability in src/explore_me/explore_me.cpp:49:3 SEVERITY 8.0 DESCRIPTION A heap use after free is the use of memory locations that has been allocated during the pro...

Opengraph URL: https://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11

X: @github

direct link

Domain: github.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"Heap Use After Free Vulnerability","articleBody":"Detected Heap Use After Free Vulnerability in [src/explore_me/explore_me.cpp:49:3](https://github.com/CodeIntelligenceTesting/c-cpp-example/blob/e59b268352d4cd4d517418c7ff036d8937503770/src/explore_me/explore_me.cpp#L49)\r\n\r\nSEVERITY\r\n8.0\r\n\r\nDESCRIPTION\r\nA heap use after free is the use of memory locations that has been allocated during the program execution then freed. For example, using attempting to use a pointer that has been freed. Accessing such locations have consequences that range from interrupting the execution to making the machine vulnerable to malicious code execution.\r\n\r\nCWE\r\n[Use After Free (#416)](https://cwe.mitre.org/data/definitions/416.html)\r\n\r\nSTACKTRACE\r\n```\r\n==11==ERROR: AddressSanitizer: heap-use-after-free on address 0x6020001daef0 at pc 0x558a4019f464 bp 0x7fffc6588ab0 sp 0x7fffc6588280\r\nREAD of size 3 at 0x6020001daef0 thread T0\r\n    #0 0x558a4019f463 in __interceptor_puts (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xd9463) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #1 0x558a402442fb in trigger_use_after_free() /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:49:3\r\n    #2 0x558a402442fb in ExploreComplexChecks(long, long, std::__cxx11::basic_string\u003cchar, std::char_traits\u003cchar\u003e, std::allocator\u003cchar\u003e\u003e) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:26:9\r\n    #3 0x558a40242719 in LLVMFuzzerTestOneInputNoReturn(unsigned char const*, unsigned long) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:25:3\r\n    #4 0x558a40242548 in LLVMFuzzerTestOneInput /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:19:1\r\n    #5 0x558a40168b03 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2b03) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #6 0x558a40168259 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2259) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #7 0x558a40169a49 in fuzzer::Fuzzer::MutateAndTestOne() (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa3a49) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #8 0x558a4016a5c5 in fuzzer::Fuzzer::Loop(std::vector\u003cfuzzer::SizedFile, std::allocator\u003cfuzzer::SizedFile\u003e\u003e\u0026) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa45c5) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #9 0x558a40158702 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x92702) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #10 0x558a401823f2 in main (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xbc3f2) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #11 0x7fb5cf22814f  (/lib/x86_64-linux-gnu/libc.so.6+0x2814f) (BuildId: 6a981b07a3731293c24c10a21397416d3c3d52ed)\r\n    #12 0x7fb5cf228208 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x28208) (BuildId: 6a981b07a3731293c24c10a21397416d3c3d52ed)\r\n    #13 0x558a4014d144 in _start (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x87144) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n\r\n0x6020001daef0 is located 0 bytes inside of 6-byte region [0x6020001daef0,0x6020001daef6)\r\nfreed by thread T0 here:\r\n    #0 0x558a40204ed2 in __interceptor_free (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x13eed2) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #1 0x558a402442f3 in trigger_use_after_free() /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:48:3\r\n    #2 0x558a402442f3 in ExploreComplexChecks(long, long, std::__cxx11::basic_string\u003cchar, std::char_traits\u003cchar\u003e, std::allocator\u003cchar\u003e\u003e) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:26:9\r\n    #3 0x558a40242719 in LLVMFuzzerTestOneInputNoReturn(unsigned char const*, unsigned long) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:25:3\r\n    #4 0x558a40242548 in LLVMFuzzerTestOneInput /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:19:1\r\n    #5 0x558a40168b03 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2b03) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #6 0x558a40168259 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2259) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #7 0x558a40169a49 in fuzzer::Fuzzer::MutateAndTestOne() (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa3a49) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #8 0x558a4016a5c5 in fuzzer::Fuzzer::Loop(std::vector\u003cfuzzer::SizedFile, std::allocator\u003cfuzzer::SizedFile\u003e\u003e\u0026) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa45c5) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #9 0x558a40158702 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x92702) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #10 0x558a401823f2 in main (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xbc3f2) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #11 0x7fb5cf22814f  (/lib/x86_64-linux-gnu/libc.so.6+0x2814f) (BuildId: 6a981b07a3731293c24c10a21397416d3c3d52ed)\r\n\r\npreviously allocated by thread T0 here:\r\n    #0 0x558a4020517e in malloc (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x13f17e) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #1 0x558a4024428d in trigger_use_after_free() /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:45:38\r\n    #2 0x558a4024428d in ExploreComplexChecks(long, long, std::__cxx11::basic_string\u003cchar, std::char_traits\u003cchar\u003e, std::allocator\u003cchar\u003e\u003e) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/explore_me.cpp:26:9\r\n    #3 0x558a40242719 in LLVMFuzzerTestOneInputNoReturn(unsigned char const*, unsigned long) /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:25:3\r\n    #4 0x558a40242548 in LLVMFuzzerTestOneInput /home/runner/work/c-cpp-example/c-cpp-example/checkout-dir/src/explore_me/complex_checks_test.cpp:19:1\r\n    #5 0x558a40168b03 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2b03) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #6 0x558a40168259 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa2259) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #7 0x558a40169a49 in fuzzer::Fuzzer::MutateAndTestOne() (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa3a49) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #8 0x558a4016a5c5 in fuzzer::Fuzzer::Loop(std::vector\u003cfuzzer::SizedFile, std::allocator\u003cfuzzer::SizedFile\u003e\u003e\u0026) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xa45c5) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #9 0x558a40158702 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0x92702) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #10 0x558a401823f2 in main (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xbc3f2) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f)\r\n    #11 0x7fb5cf22814f  (/lib/x86_64-linux-gnu/libc.so.6+0x2814f) (BuildId: 6a981b07a3731293c24c10a21397416d3c3d52ed)\r\n\r\nSUMMARY: AddressSanitizer: heap-use-after-free (/cifuzz/libfuzzer/address+undefined/complex_checks_fuzz_test/bin/src/explore_me/complex_checks_fuzz_test+0xd9463) (BuildId: 15d92887abe303fdf1a09f36d2634bd24c87c90f) in __interceptor_putsShadow bytes around the buggy address:\r\n  0x0c0480033580: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n  0x0c0480033590: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n  0x0c04800335a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n  0x0c04800335b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n  0x0c04800335c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n=\u003e0x0c04800335d0: fa fa fd fd fa fa fa fa fa fa fa fa fa fa[fd]fa\r\n  0x0c04800335e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd\r\n  0x0c04800335f0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd\r\n  0x0c0480033600: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd\r\n  0x0c0480033610: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd\r\n  0x0c0480033620: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd\r\nShadow byte legend (one shadow byte represents 8 application bytes):\r\n  Addressable:           00\r\n  Partially addressable: 01 02 03 04 05 06 07 \r\n  Heap left redzone:       fa\r\n  Freed heap region:       fd\r\n  Stack left redzone:      f1\r\n  Stack mid redzone:       f2\r\n  Stack right redzone:     f3\r\n  Stack after return:      f5\r\n  Stack use after scope:   f8\r\n  Global redzone:          f9\r\n  Global init order:       f6\r\n  Poisoned by user:        f7\r\n  Container overflow:      fc\r\n  Array cookie:            ac\r\n  Intra object redzone:    bb\r\n  ASan internal:           fe\r\n  Left alloca redzone:     ca\r\n  Right alloca redzone:    cb\r\n==11==ABORTING\r\nMS: 1 ChangeBit-; base unit: 13d8cd99d22b2dfbe23ab4dd6daac321c56374a0\r\n0x48,0x65,0x79,0x2c,0x20,0x77,0x65,0x6c,0x63,0x6f,0x6d,0x65,0x20,0x74,0x6f,0x20,0x43,0x49,0x20,0x46,0x75,0x7a,0x7a,0x21,\r\nHey, welcome to CI Fuzz!\r\nartifact_prefix='/tmp/libfuzzer-out-3565272225/'; Test unit written to /tmp/libfuzzer-out-3565272225/crash-65caedf1d4a69e866125573f33a835499c5aac7f\r\nBase64: SGV5LCB3ZWxjb21lIHRvIENJIEZ1enoh\r\n```","author":{"url":"https://github.com/serj","@type":"Person","name":"serj"},"datePublished":"2024-03-26T11:55:42.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/11/c-cpp-example/issues/11"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:d2440aaf-fd13-ce61-b0f4-199d3b975ab8
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-idC2F4:D0E56:40E946:5A92E9:696A6B48
html-safe-noncec3de4bf5fdd7275ce8be2d2076f1460657fbdc85e6b7d57918aa7ede18413c4a
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDMkY0OkQwRTU2OjQwRTk0Njo1QTkyRTk6Njk2QTZCNDgiLCJ2aXNpdG9yX2lkIjoiNjQ4NzI0MDk3MzU2MDIxMjI5NiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac09cd3d93f8ff36c117ea90efcd6f59f9e98b6a77ef9596349bcadd8953a3a60e
hovercard-subject-tagissue:2208037967
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/CodeIntelligenceTesting/c-cpp-example/11/issue_layout
twitter:imagehttps://opengraph.githubassets.com/5a3f7831028ad6806b6014d8bb353b29b6f93ef2b960f399bcd53741d921284b/CodeIntelligenceTesting/c-cpp-example/issues/11
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/5a3f7831028ad6806b6014d8bb353b29b6f93ef2b960f399bcd53741d921284b/CodeIntelligenceTesting/c-cpp-example/issues/11
og:image:altDetected Heap Use After Free Vulnerability in src/explore_me/explore_me.cpp:49:3 SEVERITY 8.0 DESCRIPTION A heap use after free is the use of memory locations that has been allocated during the pro...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernameserj
hostnamegithub.com
expected-hostnamegithub.com
None6fea32d5b7276b841b7a803796d9715bc6cfb31ed549fdf9de2948ac25d12ba6
turbo-cache-controlno-preview
go-importgithub.com/CodeIntelligenceTesting/c-cpp-example git https://github.com/CodeIntelligenceTesting/c-cpp-example.git
octolytics-dimension-user_id64019151
octolytics-dimension-user_loginCodeIntelligenceTesting
octolytics-dimension-repository_id667750533
octolytics-dimension-repository_nwoCodeIntelligenceTesting/c-cpp-example
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id667750533
octolytics-dimension-repository_network_root_nwoCodeIntelligenceTesting/c-cpp-example
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
releasef2d9f6432a5a115ec709295ae70623f33bb80aee
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11#start-of-content
https://github.com/
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FCodeIntelligenceTesting%2Fc-cpp-example%2Fissues%2F11
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FCodeIntelligenceTesting%2Fc-cpp-example%2Fissues%2F11
Sign up https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=CodeIntelligenceTesting%2Fc-cpp-example
Reloadhttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
Reloadhttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
Reloadhttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
CodeIntelligenceTesting https://github.com/CodeIntelligenceTesting
c-cpp-examplehttps://github.com/CodeIntelligenceTesting/c-cpp-example
Notifications https://github.com/login?return_to=%2FCodeIntelligenceTesting%2Fc-cpp-example
Fork 4 https://github.com/login?return_to=%2FCodeIntelligenceTesting%2Fc-cpp-example
Star 8 https://github.com/login?return_to=%2FCodeIntelligenceTesting%2Fc-cpp-example
Code https://github.com/CodeIntelligenceTesting/c-cpp-example
Issues 2 https://github.com/CodeIntelligenceTesting/c-cpp-example/issues
Pull requests 0 https://github.com/CodeIntelligenceTesting/c-cpp-example/pulls
Actions https://github.com/CodeIntelligenceTesting/c-cpp-example/actions
Projects 0 https://github.com/CodeIntelligenceTesting/c-cpp-example/projects
Security Uh oh! There was an error while loading. Please reload this page. https://github.com/CodeIntelligenceTesting/c-cpp-example/security
Please reload this pagehttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
Insights https://github.com/CodeIntelligenceTesting/c-cpp-example/pulse
Code https://github.com/CodeIntelligenceTesting/c-cpp-example
Issues https://github.com/CodeIntelligenceTesting/c-cpp-example/issues
Pull requests https://github.com/CodeIntelligenceTesting/c-cpp-example/pulls
Actions https://github.com/CodeIntelligenceTesting/c-cpp-example/actions
Projects https://github.com/CodeIntelligenceTesting/c-cpp-example/projects
Security https://github.com/CodeIntelligenceTesting/c-cpp-example/security
Insights https://github.com/CodeIntelligenceTesting/c-cpp-example/pulse
New issuehttps://github.com/login?return_to=https://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
New issuehttps://github.com/login?return_to=https://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11
Heap Use After Free Vulnerabilityhttps://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11#top
https://github.com/serj
https://github.com/serj
serjhttps://github.com/serj
on Mar 26, 2024https://github.com/CodeIntelligenceTesting/c-cpp-example/issues/11#issue-2208037967
src/explore_me/explore_me.cpp:49:3https://github.com/CodeIntelligenceTesting/c-cpp-example/blob/e59b268352d4cd4d517418c7ff036d8937503770/src/explore_me/explore_me.cpp#L49
Use After Free (#416)https://cwe.mitre.org/data/definitions/416.html
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.