Displaying test cases 27026 - 27050 of 74755 in total
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 190 Integer Overflow BadSource: Environment Read data from an environment variable GoodSource: A hardcoded non-zero, non-min, non-max, even number Sinks: add GoodSink: Ensure there will not be an overflow before performing the addition BadSink : Unchecked addition, which can lead to ove...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 71 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 68 Data flow: data pass...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 67 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 66 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 61 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 54 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 52 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 51 Data flow: data pass...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 45 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 42 Data flow: data retu...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 41 Data flow: data pass...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 31 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 19 Control flow: Dead c...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 17 Control flow: for loops
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 16 Control flow: while(...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 15 Control flow: switch(6)