Displaying test cases 248126 - 248150 of 248614 in total
-
Aviod the problem of NULL pointer derefernece
-
The test case shows a use of a allocated memory after freed.
-
An example to prevent heap overflow.
-
The test case shows avoiding improper null termination with a buffer address type complexity.
-
A software system that accepts and executes input in the form of operating system commands (e.g. system()) could allow an attacker with lesser privileges than the target software to execute commands with the elevated privileges of the executing process.
-
A software system that accepts and executes input in the form of operating system commands (e.g. system(), exec(), open()) should examine the input before its use.
-
A software system that accepts and executes input in the form of operating system commands (e.g. system(), exec(), open()) should examine the input before its use.
-
A software system that accepts and executes input in the form of operating system commands (e.g. system(), exec(), open()) should examine the input before its use.
-
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
-
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
-
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
-
Pointer is initialized and checked before use.
-
Null Dereference in a Index Alias complexity
-
The pointer p is dereferenced even though the value is null.
-
The pointer is dereferenced even though the value is null in the \'function\' call.
-
The pointer p is dereferenced even though the value is null.
-
Throws and uncaught range check exception
-
The test case has a SQL Injection weakness in a array index complexity source code.
-
integer p is not initiated before its use in a for loop
-
The test case has a SQL Injection weakness in a Scope complexity.
-
The test case has a SQL Injection weakness.
-
pointer has been deleted before use
-
By using a wrong pointer type, the program will output a non-sense value due to the pointer scaling.
-
Integer is not initiated before use
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Index Alias complexity.