Displaying test cases 425126 - 425150 of 426654 in total
-
The test case has a SQL Injection weakness in a Scope complexity.
-
The test case has a SQL Injection weakness.
-
The test case has a SQL Injection weakness.
-
pointer has been deleted before use
-
pointer has been deleted before use
-
By using a wrong pointer type, the program will output a non-sense value due to the pointer scaling.
-
By using a wrong pointer type, the program will output a non-sense value due to the pointer scaling.
-
Integer is not initiated before use
-
Integer is not initiated before use
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Index Alias complexity.
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Index Alias complexity.
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Scope complexity.
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS). The code has a Scope complexity.
-
user can input more then the max number of characters causing a stack overflow
-
user can input more then the max number of characters causing a stack overflow
-
created short is never deleted
-
created short is never deleted
-
created objects are never destroyed
-
created objects are never destroyed
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
The test case is a basic CGI source code which allows Cross-Site Scripting (XSS).
-
creates a short that it does not delete
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
users cannot add the arguments -debug -root to take advantage of leftover debug code