Displaying test cases 32326 - 32350 of 32356 in total
-
Test of tool ability to identify an unchecked (unhandled) exception in Java.
-
Test determines if a tool can identify a hardcoded password weakness in code.
-
Test of tool to identify potential resource injection weakness in source code.
-
Test of tool\'s ability to identify potential resource injection in code.
-
Test to verify that a tool identifies a potential path manipulation code weakness.
-
Tainted output allows cross-site scripting attack. (fixed version 2)
-
Tainted output allows cross-site scripting attack.
-
Tainted output allows cross-site scripting attack.
-
An unsafe function is used causing the entire container to exit.
-
An unsafe function is used causing the entire container to exit.
-
Tainted data spliced into a SQL query leads to a SQL injection issue. (fixed version)
-
Tainted data spliced into a SQL query leads to a SQL injection issue.
-
Tainted input allows command execution. (fixed version)
-
Tainted input allows command execution.
-
Memory resources are referenced indefinitely but never used, resulting in a memory leak. (fixed version 2)
-
Memory resources are referenced indefinitely but never used, resulting in a memory leak. (fixed version)
-
Memory resources are referenced indefinitely but never used, resulting in a memory leak.
-
Tainted output allows log entries to be forged. (fixed version)
-
Tainted output allows log entries to be forged.
-
Tainted output allows log entries to be forged. (fixed version)
-
Tainted output allows log entries to be forged.
-
An exception leaks internal path information to the user. (fixed version)
-
An exception leaks internal path information to the user.
-
The credentials for connecting to the database are hard-wired into the sourcecode. (fixed version 2)
-
The credentials for connecting to the database are hard-wired into the sourcecode. (fixed version)