Displaying test cases 25726 - 25750 of 25795 in total
-
user can input more then the max number of characters causing a stack overflow
-
created short is never deleted
-
created short is never deleted
-
created objects are never destroyed
-
created objects are never destroyed
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
creates a short that it does not delete
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
users cannot add the arguments -debug -root to take advantage of leftover debug code
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
creates a short that it does not delete
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
users can add the arguments -debug -root to take advantage of leftover debug code
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
Private array returned from a public method
-
Test of tool ability to identify an unchecked error condition.
-
Use of negative index when accessing an array or negative size when creating it. These test cases were graciously provided by Frederic Michaud of Defense Research & Development Canada - Valcartier. Please see test case ID 000-001-518 for an executable suite of all the DRDC test cases.
-
A string function is passed a value without format string. This can lead to a format string vulnerability if the value can be in control of a malicious user. These test cases were graciously provided by Frederic Michaud of Defense Research & Development Canada - Valcartier. Please see test case I...
-
The size passed to malloc is not big enough to represent the type. These test cases were graciously provided by Frederic Michaud of Defense Research & Development Canada - Valcartier. Please see test case ID 000-001-518 for an executable suite of all the DRDC test cases.
-
A pointer to a local variable will go out of scope after the return. These test cases were graciously provided by Frederic Michaud of Defense Research & Development Canada - Valcartier. Please see test case ID 000-001-518 for an executable suite of all the DRDC test cases.