Research Article

Research on Software Vulnerability Detection Method Based on Improved CNN Model

Table 1

Program vulnerabilities and key points.

Program vulnerabilitiesKey points

Input validation probleminsect, create, select, alter, update, order, cookie, subject, system, command, open, close, getProperty, getRuntime
Buffer overflow problemStrcpy, strlen, stract, strchr, scanf, sprintf, sterror, strcoll, sbumpc, strcnpy, cin, gets, fgets, getchat, getc,getpass, malloc, istream, printf
Misuse of APICin, gets, fgets, getchat, getc, getpass, memcpy, malloc, getParameter, equals, getProperty, read, gethostbyaddr
Content management issuesMalloc, calloc, realloc, alloca, free, new, delete, memcpy, memmove, memcmp, memchr, memset, mmap, munmap, memccpy, getpagesize
Error handling issues-Alloca, catch, throw, EnterCriticalSection
Cross site scripting problemURL, submit, cookie
Information leakage problemMalloc, calloc, realloc, alloca, memcpy, memmove