Displaying test cases 248151 - 248175 of 248614 in total
-
Try to dereference a NULL pointer
-
OS Command Injection, the user may be able to add shell-code in the function name to make it interpreted.
-
Memory leak, the allocated memory is never freed.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
Unchecked error condition; if we don\'t check the return of [em]scanf[/em] we don\'t know how many parameters have been passed.
-
The test case shows an unintentional pointer scaling.
-
The test case shows a memory leak.
-
The test case shows a memory leak.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Scope complexity.
-
user can input more then the max number of characters causing a stack overflow
-
created short is never deleted
-
created objects are never destroyed
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
creates a short that it does not delete
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
users cannot add the arguments -debug -root to take advantage of leftover debug code
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
Heap overflow
-
Uninitialized variable
-
Double free of the pointer \'first\'.