Displaying test cases 248051 - 248075 of 248614 in total
-
This test case shows an effort is made to avoid OS command injection problem.
-
This test case show there is no double free weakness.
-
Pointer is checked before use
-
The test case exposes an OS Command Injection in scope complexity.
-
The test case exposes an OS Command Injection weakness in a loop.
-
This test case is a \"fix\" to an exposed Heap Overflow with an array index complexity.
-
This is a \"fix\" of a heap overflow.
-
Index variable of a loop is initialized before use.
-
Index variable of a loop is initialized before use.
-
This code demos the Stored XSS (or Presistent) ==> "Loop Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Container Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Basic Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Scope Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with code complexity of scope.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with code complexity of loop.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with the code complexity of container.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability.
-
This servlet implements a fixed SQL injection vulnerability with a scope complexity: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements a fixed SQL injection vulnerability with an array index complexity: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements a fixed SQL injection vulnerability: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a loop complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a container complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a scope complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS): the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This test is a \"fix\" to an exposed Heap Overflow with an array index complexity