Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 8001 - 8025 of 14184 in total
-
CWE: 546 Suspicious Comment Sinks: todo GoodSink: log non-sensitive information to the logfile BadSink : does not contain a suspicious comment Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 546 Suspicious Comment Sinks: todo GoodSink: log non-sensitive information to the logfile BadSink : does not contain a suspicious comment Flow Variant: 15 Control flow: switch(7)
-
CWE: 546 Suspicious Comment Sinks: todo GoodSink: log non-sensitive information to the logfile BadSink : does not contain a suspicious comment Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 546 Suspicious Comment Sinks: todo GoodSink: log non-sensitive information to the logfile BadSink : does not contain a suspicious comment Flow Variant: 17 Control flow: for loops
-
CWE: 546 Suspicious Comment Sinks: todo GoodSink: log non-sensitive information to the logfile BadSink : does not contain a suspicious comment Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 01 Baseline
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 15 Control flow: switch(7)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 17 Control flow: for loops
-
CWE: 547 Use of Hardcoded Security Relevant Constants Sinks: GoodSink: using a constant BadSink : not using a constant Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 549 Passwords should be masked during entry to prevent others from stealing them Sinks: GoodSink: password field masked BadSink : password field unmasked Flow Variant: 01 Baseline
-
CWE: 549 Passwords should be masked during entry to prevent others from stealing them Sinks: GoodSink: password field masked BadSink : password field unmasked Flow Variant: 02 Control flow: if(true) and if(false)