Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 5576 - 5600 of 14184 in total
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 01 Baseline
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_f...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 17 Control flow: for loops
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 31 Data flow: make a copy of data within the same method
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 41 Data flow: data passed as an argument from one method to another i...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 42 Data flow: data returned from one method to another in the same class
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 45 Data flow: data passed as a private class member variable from one...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 51 Data flow: data passed as an argument from one function to another...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 52 Data flow: data passed as an argument from one method to another t...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 53 Data flow: data passed as an argument from one method to another t...