Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 23151 - 23175 of 28881 in total
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...
-
CWE: 89 SQL Injection BadSource: console_readLine Read data from the console using readLine() GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Inje...