Displaying test cases 425051 - 425075 of 426654 in total
-
The code, with a local control flow complexity, tries to execute a system command, read from the input buffer, without any validation.
-
The code, with a scope complexity, tries to execute a system command, read from the input buffer, without any validation.
-
The code tries to execute a system command, read from the input buffer, without any validation.
-
Proper bounds checking for strcat()[br][br]Still theoretically vulnerable to integer overflow.[br][br]This replaces cases 1322 and 1323. This is the fixed version of cases 2081 and 2082.
-
Off-by-one error on bounds checking for strcat(). PLOVER: NUM.OBO, BUFF.OVER This replaces case 1320
-
No bounds checking on buffer during strcat(). PLOVER: BUFF.OVER This replaces case 1319
-
The accidental addition of a data-structure sentinel can cause serious programing logic problems, e.g. .one potentially could cause data to be truncated early. (from TCCLASP-5_6_7_10). CWE 464.
-
Integer pointer is assigned a value within current buffer.
-
Character pointer is assigned value beyond current buffer using sizeof() function (with brackets).
-
Buffer Overflow. This code has been donated by MIT. This test case has the following characteristics: write/read = Write, Which bound = Upper, Data type = character, Memory location = stack, Scope = same, Container = no, Pointer = no, Index complexity = function re...
-
Since the argument (the file name) is not validated, one can open every file and print it.
-
Since the argument (the file name) is not validated, one can open every file and print it.
-
The test cases shows hard-coded password is not used.
-
The test cases shows hard-coded password is used.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer. The code has array address complexity.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer. The code has scope complexity.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
Pointer is initialized before use.
-
Uninitialized pointer is used.
-
Allocated memory is deleted after use.
-
Allocated memory is deleted after use. There will be no memory leak.