Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 18851 - 18875 of 28881 in total
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 67 Data flow: data passed in a class from one...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 68 Data flow: data passed as a member variabl...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data flow: data passed as an Object refere...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 72 Data flow: data passed in a Vector from on...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 73 Data flow: data passed in a LinkedList fro...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 74 Data flow: data passed in a HashMap from o...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 75 Data flow: data passed in a serialized obj...
-
CWE: 643 Xpath Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 81 Data flow: data passed in a parameter to a...
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 01 Baseline
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE_STATIC_FI...
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIVATE_STATIC...
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFive!=5)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(privateReturnsFalse())
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO.STATIC_FINAL_FALSE)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticFalse)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(IO.staticReturnsFals...
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC_FINAL_FIV...
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.staticFive!=5)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 16 Control flow: while(true)
-
CWE: 643 Xpath Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 17 Control flow: for loops