C++ Test Suite for Source Code Analyzer - weakness Test suite #57
DownloadDescription
This test suite tests against Source Code Security Analyzer based on functional requirements SCA-RM-1 through SCA-RM-5 specified in "Source Code Security Analysis Tool Functional Specification"
Displaying test cases 26 - 41 of 41 in total
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack. In the case of C++, misusing container vector could also cause stack overflow.
-
The test cases shows hard-coded passwords is used.
-
The test cases shows hard-coded password is used in a function.
-
The test cases shows hard-coded passwords is used in a loop.
-
The test cases shows hard-coded passwords is used in a container.
-
The test cases shows hard-coded password is used in C++ vector.
-
Created short is not deleted after use.
-
This test case shows memory leak in a local control flow.
-
Uninitialized pointer is used.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character \'a\'.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Scope complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Address complexity.
-
The test case shows a Heap Overflow by trying to insert out of the bounds of the buffer a character. The code has a Array Index complexity.
-
Integer variable is not initialized before its use.
-
Index variable in a loop is not initialized, but used.
-
This test case shows debugging code is left in the program