SAMMY works best on screens 1024px wide or larger.
V1.4.1
V1.4.1: Verify that the application uses memory-safe string, safer memory copy and pointer arithmetic to detect or prevent stack, buffer, or heap overflows.

Verify that the application uses memory-safe string, safer memory copy and pointer arithmetic to detect or prevent stack, buffer, or heap overflows.

ASVS Maturity
Description

Verify that the application uses memory-safe string, safer memory copy and pointer arithmetic to detect or prevent stack, buffer, or heap overflows.

V1.4.2
V1.4.2: Verify that sign, range, and input validation techniques are used to prevent integer overflows.

Verify that sign, range, and input validation techniques are used to prevent integer overflows.

ASVS Maturity
Description

Verify that sign, range, and input validation techniques are used to prevent integer overflows.

V1.4.3
V1.4.3: Verify that dynamically allocated memory and resources are released, and that references or pointers to freed memory are removed or set to null to prevent dangling pointers and use-after-free vulnerabilities.

Verify that dynamically allocated memory and resources are released, and that references or pointers to freed memory are removed or set to null to prevent dangling pointers and use-after-free vulnerabilities.

ASVS Maturity
Description

Verify that dynamically allocated memory and resources are released, and that references or pointers to freed memory are removed or set to null to prevent dangling pointers and use-after-free vulnerabilities.