Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 18626 - 18650 of 28881 in total
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 54 Data flow: data passed as an argument from one metho...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 61 Data flow: data returned from one method to another ...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 66 Data flow: data passed in an array from one method t...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 67 Data flow: data passed in a class from one method to...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 68 Data flow: data passed as a member variable in the a...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data flow: data passed as an Object reference argume...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 72 Data flow: data passed in a Vector from one method t...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 73 Data flow: data passed in a LinkedList from one meth...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 74 Data flow: data passed in a HashMap from one method ...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 75 Data flow: data passed in a serialized object from o...
-
CWE: 643 Xpath Injection BadSource: Environment Read data from an environment variable GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 81 Data flow: data passed in a parameter to an abstract...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 01 Baseline
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIV...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFive!=5)
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(privateRetur...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO.STATIC_FI...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticFalse)
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(IO.staticR...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC...
-
CWE: 643 Xpath Injection BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.staticFive!=5)