Displaying test cases 248201 - 248225 of 248586 in total
-
Throws and uncaught range check exception
-
The test case has a SQL Injection weakness in a array index complexity source code.
-
integer p is not initiated before its use in a for loop
-
The test case has a SQL Injection weakness in a Scope complexity.
-
The test case has a SQL Injection weakness.
-
pointer has been deleted before use
-
By using a wrong pointer type, the program will output a non-sense value due to the pointer scaling.
-
Integer is not initiated before use
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Index Alias complexity.
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Scope complexity.
-
user can input more then the max number of characters causing a stack overflow
-
created short is never deleted
-
created objects are never destroyed
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
creates a short that it does not delete
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
users cannot add the arguments -debug -root to take advantage of leftover debug code
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
Heap overflow
-
The test case shows a Stack Overflow.
-
The test case exposes a path manipulation.
-
The test case shows a path manipulation weakness.
-
The test case shows an improper null termination with a buffer address type complexity.