Displaying test cases 424976 - 425000 of 426654 in total
-
This test case shows index variable of a loop is initialized before use.
-
Variable is initialized before use.
-
Index variable in a loop is not initialized, but used.
-
Integer variable is not initialized before its use.
-
This code demos the Stored XSS (or Presistent) ==> "Loop Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Container Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Basic Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Scope Good Case". The servlet retrieves the records from database and reflects it back into the HTTP response after performing the validate, filter, escape and encode of that retrieved data.
-
This code demos the Stored XSS (or Presistent) ==> "Scope Bad Case". The servlet retrieves the records from database and directly reflects it back into the HTTP response.
-
This code demos the Stored XSS (or Presistent) ==> "Loop Bad Case". The servlet retrieves the records from database and directly reflects it back into the HTTP response.
-
This code demos the Stored XSS (or Presistent) ==> "Container Bad Case". The servlet retrieves the records from database and directly reflects it back into the HTTP response.
-
This code demos the Stored XSS (or Presistent) ==> "Basic Bad Case". The servlet retrieves the records from database and directly reflects it back into the HTTP response.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with code complexity of scope.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with code complexity of loop.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability, with the code complexity of container.
-
This code (java servlet) has a FIX to Failure to Preserve Web Page Structure 'Cross-site Scripting (XSS)' CWE-79 vulnerability.
-
This code demos the Reflected XSS (or Non-Persistent) ==> "Scope Bad Case". The servlet reads the user input from the HTTP request and directly reflects the user input back into the HTTP response.
-
This code demos the Reflected XSS (or Non-Persistent) ==> "Loop Bad Case". The servlet reads the user input from the HTTP request and directly reflects the user input back into the HTTP response.
-
This code demos the Reflected XSS (or Non-Persistent) ==> "Container Bad Case". * The servlet reads the user input from the HTTP request and directly reflects * the user input back into the HTTP response.
-
This code demos the Reflected XSS (or Non-Persistent) ==> "Basic Bad Case". * The servlet reads the user input from the HTTP request and directly reflects * the user input back into the HTTP response.
-
This servlet implements a fixed SQL injection vulnerability with a scope complexity: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements a fixed SQL injection vulnerability with an array index complexity: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements a fixed SQL injection vulnerability: a SQL request is sent to the database after testing if the current name takes part of the allowed ones.
-
This servlet implements an SQL injection vulnerability with a scope complexity: an unsanitized SQL request is sent to the database.
-
This servlet implements an SQL injection vulnerability with an array index complexity: an unsanitized SQL request is sent to the database.