Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 5626 - 5650 of 14184 in total
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 31 Data flow: make a copy of data within the same m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 41 Data flow: data passed as an argument from one m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 42 Data flow: data returned from one method to anot...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 45 Data flow: data passed as a private class member...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 51 Data flow: data passed as an argument from one f...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 52 Data flow: data passed as an argument from one m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 53 Data flow: data passed as an argument from one m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 53 Data flow: data passed as an argument from one m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 54 Data flow: data passed as an argument from one m...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 61 Data flow: data returned from one method to anot...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 66 Data flow: data passed in an array from one meth...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 67 Data flow: data passed in a class from one metho...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 68 Data flow: data passed as a member variable in t...
-
CWE: 352 Cross Site Request Forgery BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 71 Data flow: data passed as an Object reference ar...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 01 Baseline
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 04 Control flow: if(private_final_t) and i...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 05 Control flow: if(private_t) and if(priv...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 06 Control flow: if(private_final_five==5)...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 07 Control flow: if(private_five==5) and i...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 08 Control flow: if(private_returns_t()) a...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 09 Control flow: if(IO.static_final_t) and...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 10 Control flow: if(IO.static_t) and if(IO...
-
CWE: 352 Cross Site Request Forgery BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 11 Control flow: if(IO.static_returns_t())...