Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 5601 - 5625 of 14184 in total
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 53 Data flow: data passed as an argument from one method through two ...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 54 Data flow: data passed as an argument from one method through thre...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 61 Data flow: data returned from one method to another in different c...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 66 Data flow: data passed in an array from one method to another in d...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 67 Data flow: data passed in a class from one method to another in di...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 68 Data flow: data passed as a member variable in the "a" class, whic...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 71 Data flow: data passed as an Object reference argument from one me...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 01 Baseline
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 04 Control flow: if(private_final_t) and if(private...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 06 Control flow: if(private_final_five==5) and if(p...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 07 Control flow: if(private_five==5) and if(private...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 08 Control flow: if(private_returns_t()) and if(pri...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.st...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(I...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.st...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 17 Control flow: for loops
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 19 Control flow: Dead code after an if(true) return