Deprecated test suite
C Test Suite for Source Code Analyzer - false positive Test suite #46
DownloadDescription
This test suite tests against Source Code Security Analyzer based on functional requirements SCA-RM-6 specified in "Source Code Security Analysis Tool Functional Specification"
Displaying test cases 51 - 73 of 73 in total
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case exposes a Cross-Site Scripting (XSS) in C/CGI programming.
-
The test case shows a memory leak.
-
The test case shows a memory leak.
-
The test case shows an unintentional pointer scaling.
-
Unchecked error condition; if we don\'t check the return of [em]scanf[/em] we don\'t know how many parameters have been passed.
-
The SQL Injection is possible because the arguments are not validated before the MySQL query.
-
Memory leak, the allocated memory is never freed.
-
The test case shows avoiding improper null termination with a buffer address type complexity.
-
The test cases implements CVE-2002-1869: Don't check if you can write a log file allow attackers to avoid logging. This test case replaces test case 1864
-
An example to prevent heap overflow.
-
The test case shows a use of a allocated memory after freed.
-
Pointer is checked before use
-
This is a CGI program which take some parameters values then print it. It shows it tries to avoid Cross-Site Scripting in C. This test case replace Test case 1793.
-
The test case shows a use of a allocated memory after freed.
-
This test case show there is no double free weakness.
-
The test case exposes a race condition while writing the file.
-
The test case exposes a race condition while writing the file.
-
The test case shows a use of a allocated memory after freed.
-
This test case shows an effort is made to avoid OS command injection problem.
-
This test shows a null pointer is not dereferenced, in a local control flow.
-
This test case avoids the problem of NULL pointer dereference.
-
The test case shows a use of a allocated memory after freed.