Juliet C/C++ 1.3.1 with extra support Test suite #116
DownloadDescription
A collection of C and C++ test cases updated from Juliet C/C++ 1.3. This test suite updates 28 test cases:
- 18 test cases related to CWE-476: 104778, 104779, 104780, 104781, 104782, 104783, 104784, 104785, 104786, 104787, 104788, 104789, 104790, 104791, 104792, 104793, 104794, 104795
- 10 test cases related to CWE-457: 103357, 103379, 240459, 103556, 103578, 240519, 103754, 103909, 240579 and 104085
Thanks to Markus Schordan for reporting the issues.
Displaying test cases 41626 - 41650 of 64099 in total
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 07 Control flow: if(staticFive==5) and if(staticFive!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 08 Control flow: if(staticReturnsTrue()) and if(staticReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 09 Control flow: if(GLOBAL_CONST_TRUE) and if(GLOBAL_CONST_FALSE)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 10 Control flow: if(globalTrue) and if(globalFalse)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 11 Control flow: if(globalReturnsTrue()) and if(globalReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 12 Control flow: if(globalReturnsTrueOrFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 13 Control flow: if(GLOBAL_CONST_FIVE==5) and if(GLOBAL_CONST_FIVE!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 14 Control flow: if(globalFive==5) and if(globalFive!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 15 Control flow: switch(6)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 16 Control flow: while(1)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 17 Control flow: for loops
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 18 Control flow: goto statements
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow V...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant:...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow Variant: 22 Cont...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 61 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 62 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 81 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant: 82 Data flow: ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 83 Dat...