Displaying test cases 74251 - 74275 of 74617 in total
-
The test case shows a use of a allocated memory after freed.
-
This test case avoids the problem of NULL pointer dereference.
-
This test case show there is no double free weakness.
-
The test case shows a use of a allocated memory after freed.
-
The test case shows a use of a allocated memory after freed. This test case replaces test case 1915.
-
The test case shows a use of a allocated memory after freed.
-
The test case shows a use of a allocated memory after freed.
-
Attempt to return a pointer to memory that has been freed. This replaces test case 2108
-
This test case shows a block of memory is freed twice. This test case replaces 1446
-
This is a CGI program which take some parameters values then print it. It shows it tries to avoid Cross-Site Scripting in C. This test case replace Test case 1793.
-
This is a CGI program which take some parameters values then print it. It shows Cross-Site Scripting in C. This test case replace Test case 1792.
-
The test cases implements CVE-2002-1869: Don't check if you can write a log file allow attackers to avoid logging. This test case replaces test case 1864
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 06 Control flow: if(static_const_five==5) and if(static_const_five!=5)
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 05 Control flow: if(static_t) and if(static_f)
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 04 Control flow: if(static_const_t) and if(static_const_f)
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 114 Process Control BadSource: Environment Read input from an environment variable GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 01 Baseline
-
test submit.php 4
-
Test submit.php 3
-
CWE-479 Unsafe Call from a Signal_Handler
-
CWE-479 Unsafe Call from a Signal_Handler
-
CWE 15
-
CWE 15
-
The test case shows a use of a allocated memory after freed. This test case replaces test case 1915.