Back to the previous page
| Test Case ID | 2025 |
| Bad / Good / Mixed | Good |
| Author | |
| Associations | Test suite: 58 |
| Added by | Michael Koo |
| Language | C++ |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | |
| Submission date | 2007-11-29 |
| Description | Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system. |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
File Contains:
CWE-099: Improper Control of Resource Identifiers ('Resource Injection') on line(s): 0
CWE-099: Improper Control of Resource Identifiers ('Resource Injection') on line(s): 0

