Displaying test cases 18301 - 18325 of 45437 in total
-
Using the value of an unitialized variable is not safe.
-
The test case avoids improper null termination with a buffer address type complexity.
-
The test case shows a weakness of improper null termination with a buffer address type complexity.
-
No buffer overflow even if the input is not validated. Every operation may write outside the bound of the statically allocated character array.
-
Buffer overflow if the input is not validated. Every operation may write outside the bound of the statically allocated character array.
-
The variable px now is initialized, avoiding the use of an uninitialized value.
-
Using the value of an unitialized variable is not safe.
-
No memory leak, the allocated memory is freed.
-
Memory leak, the allocated memory is never freed.
-
The SQL Injection is not possible because the arguments are validated before the MySQL query.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
If we check the return of scanf we know how many parameters have been passed.
-
If we do not check the return of scanf we do not know how many parameters have been passed.
-
The test case shows a correct pointer scaling.
-
The test case shows an unintentional pointer scaling.
-
The test case prevents a memory leak by releasing memory allocated in a loop.
-
The test case shows a memory leak occurring due to memory not being released inside of a loop.
-
The test case prevents a memory leak with a pointer which is in a structure.
-
The test case shows a memory leak with a pointer which is in a structure.
-
The test case avoids a Cross-Site Scripting (XSS) in a C/CGI program with scope complexity.
-
The test case exposes a Cross-Site Scripting (XSS) in a C/CGI program with scope complexity.
-
The test case avoids a Cross-Site Scripting (XSS) in a C/CGI program with a string which is in a structure.
-
The test case exposes a Cross-Site Scripting (XSS) in a C/CGI program with a string which is in a structure.
-
The test case avoids a Cross-Site Scripting (XSS) in a C/CGI program with an address alias level code complexity.
-
The test case exposes a Cross-Site Scripting (XSS) in a C/CGI program with an address alias level code complexity.