Displaying test cases 248151 - 248175 of 248586 in total
-
This test is a \"fix\" to an exposed Heap Overflow with an array index complexity
-
Basically developer can debug his code by typing \"-debug\" but here debugging code is removed.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is an address alias level complexity.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is an inter procedural scope complexity.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is a local control flow complexity, which is a \"switch\" conditional structure.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught.
-
Suppose the file /tmp/resourceLock is used as a resource lock. This program grabs the lock (if available), and later releases it.
-
A FileInputStream such as image data is tried to be created. Exceptions and other error conditions are no more ignored.
-
It checks the state of the file myfile.txt. Its state can change with the function sleep, but is verified before using it.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is an array index complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a container complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a loop structure complexity (for).
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a local control flow (switch).
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.
-
The code, with a container complexity, creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code, with an inter procedural scope complexity, creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code creates a FileOutputStream from a file which is allowed to use (by comparing with the table of allowed files).
-
The code, with a loop structure complexity (for), tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code, with a local control flow complexity (switch), tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code, with a inter procedural scope complexity, tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
The code tries to execute a system command, read from the input buffer. Validation is done by ProcessBuilder before execution.
-
Proper bounds checking for strcat()[br][br]Still theoretically vulnerable to integer overflow.[br][br]This replaces cases 1322 and 1323. This is the fixed version of cases 2081 and 2082.
-
Integer pointer is assigned a value within current buffer.
-
Buffer Overflow. This code has been donated by MIT. This test case has the following characteristics: write/read = Write, Which bound = Upper, Data type = character, Memory location = stack, Scope = same, Container = no, Pointer = no, Index complexity = function re...
-
Since the argument (the file name) is not validated, one can open every file and print it.