Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.
570bdf87132b23120339e247809dc2cf37c2735d504f4e1072528c04d940bb5f
Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.
cb2bd189b24663cf55c1b9bdbb2a40e2e84b75ece85ee86e49e70a5a8336c490
Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.
c6beb8eac16a70536e72db9caef8391c0211c691fbe1f60769b326232ad168e7