Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 5451 - 5475 of 14184 in total
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 15 Control flow: switch(7)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 01 Baseline
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())