SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Test Suite #6: ABM 1.0.1

Results: 112 test cases in 6 pages. Pages: 1 2 3 4 5 6
Go to page:

Select Test Case ID(up) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
16352006-06-22CSource CodeCandidate Snprintf is called with an improper bound. A guard in the ...CWE-122: Heap-based Buffer Overflow
Good test case
16342006-06-22CSource CodeCandidate Snprintf is called with an improper bound. A guard in the ...CWE-122: Heap-based Buffer Overflow
Bad test case
16332006-06-22CSource CodeCandidate snprintf is used repeatedly while keeping track of the residual ...CWE-122: Heap-based Buffer Overflow
Good test case
16322006-06-22CSource CodeCandidate snprintf is used repeatedly while keeping track of the residual ...CWE-122: Heap-based Buffer Overflow
Bad test case
16312006-06-22CSource CodeCandidate snprintf with correct bounds safely copies a string into a heap ...CWE-122: Heap-based Buffer Overflow
Good test case
16302006-06-22CSource CodeCandidate snprintf with incorrect bounds allows a heap buffer to be overrun.CWE-122: Heap-based Buffer Overflow
Bad test case
16292006-06-22CSource CodeCandidate Snprintf is called with a bad bound but is protected with a ...CWE-121: Stack-based Buffer Overflow
Good test case
16282006-06-22CSource CodeCandidate Snprintf is called with a bad bound. An attempt is made to ...CWE-122: Heap-based Buffer Overflow
Bad test case
16272006-06-22CSource CodeCandidate Snprintf is called with an improper bound. A guard in the ...CWE-121: Stack-based Buffer Overflow
Good test case
16262006-06-22CSource CodeCandidate Snprintf is called with an improper bound. A guard in the ...CWE-121: Stack-based Buffer Overflow
Bad test case
16252006-06-22CSource CodeCandidate A snprintf with an improper bound is protected with a guard that ...CWE-121: Stack-based Buffer Overflow
Good test case
16242006-06-22CSource CodeCandidate A snprintf with incorrect bound is used to copy a string. An ...CWE-121: Stack-based Buffer Overflow
Bad test case
16232006-06-22CSource CodeCandidate snprintf is used repeatedly while keeping track of the residual ...CWE-121: Stack-based Buffer Overflow
Good test case
16222006-06-22CSource CodeCandidate snprintf is used repeatedly while keeping track of the residual ...CWE-121: Stack-based Buffer Overflow
Bad test case
16212006-06-22CSource CodeCandidate Snprintf with a bad bounds is used to copy a string. The buffer ...CWE-121: Stack-based Buffer Overflow
Good test case
16202006-06-22CSource CodeCandidate Sprintf with a bad bounds is allows a stack buffer to be ...CWE-121: Stack-based Buffer Overflow
Bad test case
16192006-06-22CSource CodeCandidate Snprintf is used to copy several static strings. Although an ...CWE-121: Stack-based Buffer Overflow
Good test case
16182006-06-22CSource CodeCandidate Snprintf is used to copy a large static string. Since an ...None givenBad test case
16172006-06-22CSource CodeCandidate snprintf with correct bounds safely copies a string into a stack ...CWE-121: Stack-based Buffer Overflow
Good test case
16162006-06-22CSource CodeCandidate snprintf with incorrect bounds allows a stack buffer to be overrun.CWE-121: Stack-based Buffer Overflow
Bad test case
1 2 3 4 5 6
Total of selected test cases: 112
Total pages: 6