Displaying test cases 425001 - 425025 of 426654 in total
-
This servlet implements an SQL injection vulnerability: an unsanitized SQL request is sent to the database.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a loop complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a container complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS) with a scope complexity: the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a fixed Cross-Site Scripting vulnerability (XSS): the data provided by the client in the field "data" is encoded so there is no more XSS.
-
This servlet implements a Cross-Site Scripting vulnerability (XSS) with a loop complexity : the data provided by the client in the field "data" is written as is, without any filtering, to the output document.
-
This servlet implements a Cross-Site Scripting vulnerability (XSS) with a container complexity : the data provided by the client in the field "data" is written as is, without any filtering, to the output document.
-
This servlet implements a Cross-Site Scripting vulnerability (XSS) with a scope complexity : the data provided by the client in the field "data" is written as is, without any filtering, to the output document.
-
This servlet implements a Cross-Site Scripting vulnerability (XSS): the data provided by the client in the field "data" is written as is, without any filtering, to the output document.
-
Test tool ability to identify potential problem of the use of static internal buff
-
Attempt to call function of deleted object.
-
Memory allocated with new() function call is not freed with delete() call, nor is its pointer returned by the funcation.
-
This test is a \"fix\" to an exposed Heap Overflow with an array index complexity
-
Basically developer can debug his code by typing \"-debug\" but here debugging code is removed.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is an address alias level complexity.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is an inter procedural scope complexity.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught. Moreover there is a local control flow complexity, which is a \"switch\" conditional structure.
-
Here we try to get the system property from a specified key and then remove whitespace. If the key is unknown, cmd is null and the null dereference exception is caught.
-
Suppose the file /tmp/resourceLock is used as a resource lock. This program grabs the lock (if available), and later releases it.
-
A FileInputStream such as image data is tried to be created. Exceptions and other error conditions are no more ignored.
-
It checks the state of the file myfile.txt. Its state can change with the function sleep, but is verified before using it.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is an array index complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a container complexity.
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a loop structure complexity (for).
-
The password to know if the user is authorized to do high-level work is verified by checking the matching with the user name.Moreover there is a local control flow (switch).