Displaying test cases 18376 - 18400 of 45437 in total
-
This test case uses PAM to avoid hard-coded password in a local control flow.
-
This test case shows a hard-coded password in a local control flow.
-
The test case exposes a password which is not hard-coded in the source code.
-
The test case exposes a password which is hard-coded in the source code, the password is stored in a C structure.
-
The test case shows hard-coded passwords are not used; these passwords are in a array.
-
The test case shows hard-coded passwords; these passwords are in a array.
-
This test case avoids a format string vulnerability in a local control flow; here, we use function pointer for control flow.
-
This test case shows a format string vulnerability in a local control flow; here, we use function pointer for control flow.
-
This test case avoids a format string vulnerability with a container code complexity.
-
This test case exposes a format string vulnerability with a container code complexity.
-
This test case avoids a double free in a for loop structure.
-
This test case shows a double free in a for loop structure.
-
This test case avoids a double free in a local control flow complexity.
-
This test case shows a double free in a local control flow complexity.
-
The test case exposes a password which is not hard-coded in the source code.
-
The use of a hard-coded password increases the possibility of password guessing tremendously.
-
The test case avoids a Time-of-Check-Time-of-Use (TOCTOU) race condition between checking access permissions and then opening and writing to the file using random calls to function pointers.
-
The test case shows a Time-of-Check-Time-of-Use (TOCTOU) race condition between checking access permissions and then opening and writing to the file using random calls to function pointers.
-
The test case avoids a Time-of-Check-Time-of-Use (TOCTOU) race condition between checking access permissions and then opening and writing to the file.
-
The test case shows a Time-of-Check-Time-of-Use (TOCTOU) race condition between checking access permissions and then opening and writing to the file.
-
The SQL Injection is not possible because the arguments are validated. The code complexity is in the call of another function to perform the MySQL query.
-
The SQL Injection is possible because the arguments are not validated. The code complexity is in the call of another function to perform the MySQL query.
-
The SQL Injection is not possible because the arguments are validated.
-
The SQL Injection is possible if the arguments are not validated.
-
The SQL Injection is not possible because the arguments are validated before the MySQL query.