Deprecated test suite
Juliet C/C++ 1.3 with extra support Test suite #108
DownloadDescription
A collection of C and C++ test cases updated from Juliet 1.2
Note: An error in the SARD database caused wrong files to be included in some test cases. The error has been fixed on 11/17/2018.
Documentation
Displaying test cases 41626 - 41650 of 64099 in total
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 07 Control flow: if(staticFive==5) and if(staticFive!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 08 Control flow: if(staticReturnsTrue()) and if(staticReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 09 Control flow: if(GLOBAL_CONST_TRUE) and if(GLOBAL_CONST_FALSE)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 10 Control flow: if(globalTrue) and if(globalFalse)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 11 Control flow: if(globalReturnsTrue()) and if(globalReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 12 Control flow: if(globalReturnsTrueOrFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 13 Control flow: if(GLOBAL_CONST_FIVE==5) and if(GLOBAL_CONST_FIVE!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 14 Control flow: if(globalFive==5) and if(globalFive!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 15 Control flow: switch(6)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 16 Control flow: while(1)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 17 Control flow: for loops
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 18 Control flow: goto statements
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow V...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant:...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow Variant: 22 Cont...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 61 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 62 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 81 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant: 82 Data flow: ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 83 Dat...