Juliet Java 1.3 with extra support Test suite #109
DownloadDescription
A collection of Java test cases updated from Juliet 1.2
Documentation
Displaying test cases 23326 - 23350 of 28881 in total
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: executeUpdate GoodSink: Use prepared statement and executeUpdate (properly) BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection F...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 01 Ba...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 02 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 03 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 04 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 05 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 06 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 07 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 08 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 09 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 10 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 11 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 12 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 13 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 14 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 15 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 16 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 17 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 21 Co...
-
CWE: 89 SQL Injection BadSource: database Read data from a database GoodSource: A hardcoded string Sinks: execute GoodSink: Use prepared statement and execute (properly) BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection Flow Variant: 22 Co...