A sample of the critical defects reported by Prevent SQS for C/C++ include: Concurrency Issues, Double locks, missing locks, Locks acquired in incorrect order, Locks held by blocking functions, Memory Corruption and Mismanagement, Resource leaks, Calls to freeing functions using invalid arguments, Excessive stack use in memory constrained systems, Crash-causing pointer errors, Dereference of null pointers, Failure to check for null return values and Misuse of data contained within wrapper data types.
C++ Specific Errors are Misuse of STL iterators, Failure to de-allocate memory by destructors, Incorrect override of virtual functions, Uncaught exceptions, Window/COM Specific Errors, Incorrect memory allocation with COM interfaces, Incorrect type conversions, Security Vulnerabilities, Buffer overruns, SQL injection, Cross-site scripting and Integer overflows.
C++ Specific Errors are Misuse of STL iterators, Failure to de-allocate memory by destructors, Incorrect override of virtual functions, Uncaught exceptions, Window/COM Specific Errors, Incorrect memory allocation with COM interfaces, Incorrect type conversions, Security Vulnerabilities, Buffer overruns, SQL injection, Cross-site scripting and Integer overflows.
You must be registered to see links
is the market leader in improving software quality and security. Its groundbreaking technology automates the approach to identifying and resolving critical defects and security vulnerabilities in C/C++ and Java source code. More than 300 leading companies have chosen their Prevent SQS because it scales to tens of millions of lines of code, has the lowest false positive rate in the industry and provides total path coverage. Companies like Ericsson, HP, Samsung, EMC, and Symantec work with Small business website design to eliminate security and quality defects from their mission-critical systems