Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 9801 - 9825 of 14184 in total
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 42 Data flow: data retu...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 45 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 51 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 52 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 53 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 53 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 54 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 61 Data flow: data retu...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 66 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 67 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 68 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data flow: data pass...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 01 Ba...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 02 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 03 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 04 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 05 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 06 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 07 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 08 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 09 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 10 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 11 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 12 Co...
-
CWE: 643 Unsafe Treatment of XPath Input BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string Sinks: unvalidatedXPath GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 13 Co...