Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 19026 - 19050 of 28881 in total
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 31 Data flow: make a copy of data within the same me...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 41 Data flow: data passed as an argument from one me...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 42 Data flow: data returned from one method to anoth...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 45 Data flow: data passed as a private class member ...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 51 Data flow: data passed as an argument from one fu...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 52 Data flow: data passed as an argument from one me...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 53 Data flow: data passed as an argument from one me...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 54 Data flow: data passed as an argument from one me...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 61 Data flow: data returned from one method to anoth...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 66 Data flow: data passed in an array from one metho...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 67 Data flow: data passed in a class from one method...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 68 Data flow: data passed as a member variable in th...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data flow: data passed as an Object reference arg...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 72 Data flow: data passed in a Vector from one metho...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 73 Data flow: data passed in a LinkedList from one m...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 74 Data flow: data passed in a HashMap from one meth...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 75 Data flow: data passed in a serialized object fro...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 81 Data flow: data passed in a parameter to an abstr...
-
Improper Locking
-
Recursion not limited to a managed level
-
uncontrolled recursion due to missing base or exit case
-
CWE: 681 Incorrect Conversion Between Numeric Types Sinks: double2float GoodSink: check for conversion error BadSink : explicit cast Flow Variant: 01 Baseline
-
CWE: 681 Incorrect Conversion Between Numeric Types Sinks: double2float GoodSink: check for conversion error BadSink : explicit cast Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 681 Incorrect Conversion Between Numeric Types Sinks: double2float GoodSink: check for conversion error BadSink : explicit cast Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 681 Incorrect Conversion Between Numeric Types Sinks: double2float GoodSink: check for conversion error BadSink : explicit cast Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE_STATIC_FINAL_FALSE)