Displaying test cases 23601 - 23625 of 74755 in total
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 17 Control flow: for loops
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 15 Control flow: switch(7)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 01 Baseline
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 15 Control flow: switch(7)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())