Displaying test cases 74551 - 74575 of 74755 in total
-
This test case shows a hard-coded password in a local control flow.
-
The test case exposes a password which is hard-coded in the source code, the password is stored in a C structure.
-
The test case exposes a password which is hard-coded in the source code, the password is stored in a C structure.
-
The test cases shows hard-coded passwords; these passwords are in a array.
-
The test cases shows hard-coded passwords; these passwords are in a array.
-
This test case shows a format string vulnerability in a local control flow; here, we use function pointer for control flow.
-
This test case shows a format string vulnerability in a local control flow; here, we use function pointer for control flow.
-
This test cases exposes a format string vulnerability with a container code complexity.
-
This test cases exposes a format string vulnerability with a container code complexity.
-
This test case shows a double free in a for loop structure.
-
This test case shows a double free in a for loop structure.
-
This test case shows a double free in a local control flow complexity.
-
This test case shows a double free in a local control flow complexity.
-
The use of a hard-coded password increases the possibility of password guessing tremendously. (from TCCLASP-5_5_9_10-C)
-
This test case exposes a Race Condition error at the line 47. Many processes can access the same file in different moment.
-
This test case exposes a Race Condition error at the line 47. Many processes can access the same file in different moment.
-
This test case exposes a Race Condition error at the line 26. Many processes can access the same file in different moment.[br] We can have something like that:[br] Process 1: Open File[br] Process 1: Close File[br] Process 2: Open File[br] Process 3: Open File[br] Process 2: Close File[br] Proces...
-
This test case exposes a Race Condition error at the line 26. Many processes can access the same file in different moment.[br] We can have something like that:[br] Process 1: Open File[br] Process 1: Close File[br] Process 2: Open File[br] Process 3: Open File[br] Process 2: Close File[br] Proces...
-
The SQL Injection is possible because the argument are not validated. The code complexity is in the call of another function to perform the MySQL query.
-
The SQL Injection is possible because the argument are not validated. The code complexity is in the call of another function to perform the MySQL query.
-
The SQL Injection is possible if the arguments are not validated.
-
The SQL Injection is possible if the arguments are not validated.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
Syslog is called with a user supplied format string. An attempt was made to preformat the buffer but the vulnerability remains. PLOVER: BUFF.OVER, BUFF.FORMAT