Displaying test cases 424951 - 424975 of 426654 in total
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 08 Control flow: if(staticReturnsTrue()) and if(staticReturnsFalse())
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 07 Control flow: if(staticFive==5) and if(staticFive!=5)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 06 Control flow: if(STATIC_CONST_FIVE==5) and if(STATIC_CONST_FIVE!=5)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 05 Control flow: if(staticTrue) and if(staticFalse)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 04 Control flow: if(STATIC_CONST_TRUE) and if(STATIC_CONST_FALSE)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 114 Process Control BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Hard code the full pathname to the library Sink: BadSink : Load a dynamic link library Flow Variant: 01 Baseline
-
This code implements Hard-coded Password vulnerability in a "Loop" structure
-
This code implements Hard-coded Password vulnerability in a "Scope" structure
-
This code implements Hard-coded Password vulnerability
-
The code updates database table. User-controlled data are sanitized by using SQL parameters.
-
The code updates database table. Data are sanitized by using SQL parameters.
-
The code updates database table. User-controlled data are sanitized by using SQL parameters.
-
This code implements SQL Injection vulnerability in a "Loop" structure, data provided by the client in the text box is written as is to SQL query, without any filtering
-
This code implements SQL Injection vulnerability in a "Scope" structure, data provided by the client in the text box is written as is to SQL query, without any filtering
-
This code implements SQL Injection vulnerability, data provided by the client in the text box is written as is to SQL query, without any filtering
-
The code implements Cross-site Scripting, data provided by the client is written as is, without any filtering
-
The code implements Cross-site Scripting, data provided by the client is written as is, without any filtering
-
The code implements Cross-site Scripting, data provided by the client is written as is, without any filtering
-
The code implements OS Command Injection, it runs OS Command entered by user without validating the input
-
The code implements OS Command Injection, it runs OS Command entered by user without validating the input
-
The code implements OS Command Injection, it runs OS Command entered by user without validating the input
-
This test case shows the debugging code is removed from the program. Please refer to test cases 2196
-
This test case shows debugging code is left in the program