Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 19001 - 19025 of 28881 in total
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 72 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 73 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 74 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 75 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 81 Data f...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 01 Baseline
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and i...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) an...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFi...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(pri...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO....
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticF...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(I...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.stat...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 16 Control flow: while(true)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 17 Control flow: for loops
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 21 Control flow: Flow controlled by value of a priva...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 22 Control flow: Flow controlled by value of a publi...