Review the query string passed to {0} in {1} for possible SQL injection attacks. If the string is composed using any user input, consider using a stored procedure or a parameterized SQL query instead of building the query with string concatenations.
Review parameters in non-virtual methods that are not used in the method body to ensure no correctness exists around failure ...
Review the following for a possible security vulnerability: In {0}, the class member {1} is being passed to a {2} constructor. ...
Review the following for a possible security vulnerability: In {0}, the return value of a call to {1} is being passed to ...
Review the list of tasks the wizard has performed. Click Finish to complete the wizard or click Previous to make changes. ...
Review the query string passed to {0} in {1} for possible SQL injection attacks. If the string is composed using any user ...
RG1002: ResourcesGenerator can generate only one .resources file at a time. The OutputResourcesFile property in the project ...
Right-click on a member name in the Code Editor, and then click View Call Hierarchy to view the member's call hierarchy in ...
Role instances did not start within the time allowed. Please try again. If you continue to encounter this behavior please ...
Role instances didn't get the state '{0}' within the time allowed. Please try again. If you continue to encounter this behavior ...