SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Results: 638 test cases in 32 pages. Pages: << 1 2 3 4 5 6 ... >> Last
Go to page:

Select Test Case ID(up) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
1536522015-10-06CSource CodeCandidate This test case creates a struct that has a message_type field ...CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
Bad test case
1536442015-10-06CSource CodeCandidate This test case allocates a buffer on the heap, copies the input ...CWE-761: Free of Pointer not at Start of Buffer
Bad test case
1536392015-10-06CSource CodeCandidate This test case implements an improper array index validation ...CWE-129: Improper Validation of Array Index
Bad test case
1536352015-10-06CSource CodeCandidate This test case implements a buffer that is used after it has ...CWE-416: Use After Free
Bad test case
1536252015-10-06CSource CodeCandidate This test case creates a buffer on the stack of 1024 bytes and a ...CWE-806: Buffer Access Using Size of Source Buffer
Bad test case
1535942015-10-06CSource CodeCandidate This test case allocates a buffer on the stack, with a canary ...CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer
Bad test case
1535902015-10-06CSource CodeCandidate This test case implements an incorrectly checked write into a ...CWE-124: Buffer Underwrite ('Buffer Underflow')
Bad test case
1535812015-10-06CSource CodeCandidate This test case creates a struct on the stack that contains a ...CWE-824: Access of Uninitialized Pointer
Bad test case
1535702015-10-06CSource CodeCandidate This test case creates two buffers on the stack, one of 64 bytes andoCWE-806: Buffer Access Using Size of Source Buffer
Bad test case
1535552015-10-06CSource CodeCandidate This test case implements an unchecked read from a buffer. The ...CWE-126: Buffer Over-read
Bad test case
1535542015-10-06CSource CodeCandidate This test case allocates a struct on the stack, with a ...CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer
Bad test case
1535462015-10-06CSource CodeCandidate This test case implements an unchecked read from a buffer. The ...CWE-127: Buffer Under-read
Bad test case
1535362015-10-06CSource CodeCandidate This test case implements an unchecked write into a heap ...CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Bad test case
1535342015-10-06CSource CodeCandidate This test case implements a heap allocated buffer that ...CWE-415: Double Free
Bad test case
1535332015-10-06CSource CodeCandidate This test case allocates a struct on the heap that contains an ...CWE-805: Buffer Access with Incorrect Length Value
Bad test case
1535222015-10-06CSource CodeCandidate This test case implements an unchecked read from a buffer. The ...CWE-126: Buffer Over-read
Bad test case
1535212015-10-06CSource CodeCandidate This test case allocates a struct on the heap that contains an ...CWE-805: Buffer Access with Incorrect Length Value
Bad test case
1535192015-10-06CSource CodeCandidate This test case allocates a struct on the heap that contains an ...CWE-805: Buffer Access with Incorrect Length Value
Bad test case
1535002015-10-06CSource CodeCandidate This test case implements an unchecked write into a stack ...CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Bad test case
1534912015-10-06CSource CodeCandidate This test case implements an sprintf that uses untrusted user ...CWE-134: Uncontrolled Format String
Bad test case
<< 1 2 3 4 5 6 ... >> Last
Total of selected test cases: 638
Total pages: 32