Displaying test cases 74451 - 74475 of 74755 in total
-
Try to dereference a NULL pointer
-
Aviod the problem of NULL pointer derefernece
-
OS Command Injection, the user may be able to add shell-code in the function name to make it interpreted.
-
Test of tool ability to identify a NULL pointer dereference.
-
The test case shows a use of a allocated memory after freed.
-
An example to prevent heap overflow.
-
Using the value of an unitialized variable is not safe. (from TCCLASP-5_6_4_10)
-
The test case shows avoiding improper null termination with a buffer address type complexity.
-
The test case shows a weakness of improper null termination with a buffer address type complexity.
-
Buffer overflow if the input is not validated. Every operation may write outside the bound of the statically allocated character array. From \"Secure Coding in C and C++\" by Robert C. Seacord. Page 28, Figure 2-2.
-
Using the value of an unitialized variable is not safe.
-
Memory leak, the allocated memory is never freed.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
Unchecked error condition; if we don\'t check the return of [em]scanf[/em] we don\'t know how many parameters have been passed.
-
Unchecked error condition; if we don\'t check the return of [em]scanf[/em] we don\'t know how many parameters have been passed.
-
The test case shows an unintentional pointer scaling.
-
The test case shows a memory leak.
-
The test case shows a memory leak.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
If too few arguments are sent to a function, the function will still pop the expected number of arguments from the stack. Potentially, a variable number of arguments could be exhausted in a function as well. (from TCCLASP-5_6_2_10) (CWE 234) Note: some compilers that check whether too few argume...
-
The test case shows a use of a allocated memory after freed.
-
Pointer is initialized and checked before use.
-
Uninitialized variable
-
Double free of the pointer \'first\'.