Displaying test cases 46376 - 46400 of 46447 in total
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught.
-
Suppose the file /tmp/resourceLock is used as a resource lock. This program grabs the lock (if available), and later releases it.
-
A FileInputStream such as image data is tried to be created. Exceptions and other error conditions are no more ignored.
-
It checks the state of the file myfile.txt. Its state can change with the function sleep, but is verified before using it.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is an array index complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a container complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a loop structure complexity (for).
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a local control flow (switch).
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.
-
The code, with a container complexity, creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code, with an inter procedural scope complexity, creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code, with a loop structure complexity (for), tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code, with a local control flow complexity (switch), tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code, with a inter procedural scope complexity, tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
This test is an example of a \"potential\" null pointer dereference, with an inter-procedural scope complexity. If a system variable \"java.class.path\" is undefined, then any attempt to use its value will result in a null pointer dereference.
-
This test is an example of a \"potential\" null pointer dereference, with a local control flow complexity, which is a \"switch\" conditional structure. If a system variable \"java.class.path\" is undefined, then any attempt to use its value will result in a null pointer dereference.
-
This test is an example of a \"potential\" null pointer dereference, with a one level of address aliasing. If a system variable \"java.class.path\" is undefined, then any attempt to use its value will result in a null pointer dereference. Code complexity: adress alias level
-
This is an example of what could be a critical resource lock weakness. A temporary file is locked by the application, but not released. If the file is used by other processes could be delayed or denied, creating a potential \"denial of service\".
-
This test illustrates an \"unchecked error condition\" weakness, where an exception is \"caught\", but no action is taken within the \"catch\" clause.
-
This test is an example of a \"potential\" null pointer dereference. If a system variable \"java.class.path\" is undefined, then any attempt to use its value will result in a null pointer dereference.
-
This test illustrates the potential to create entry points in the application (and possibly expose state information) that would otherwise not be available to a general user. This is possible through evaluation of user input for a \"debug\" command.
-
The code checks the state of a file to use but its state can change while the thread function sleep is running. So results are invalid.
-
Authorization is given by an hard-coded password, which is built into the code. So it can be read from a copy, be changed easily, and every copy of the code uses the same one.