Juliet Java 1.0 Test suite #24
DownloadDescription
A collection of test cases in the Java language. It contains examples for 106 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 1976 - 2000 of 14184 in total
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 31 Data flow: make a copy of data within ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 41 Data flow: data passed as an argument from one ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 42 Data flow: data returned from one method to ano...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 45 Data flow: data passed as a private cl...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 51 Data flow: data passed as an argument from one ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 52 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 54 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 61 Data flow: data returned from one meth...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 66 Data flow: data passed in an array fro...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 67 Data flow: data passed in a class from...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 68 Data flow: data passed as a member variable in ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 71 Data flow: data passed as an Object re...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 01 Baseline
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 02 Control flow: if(true) and if...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 03 Control flow: if(5==5) and if...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 04 Control flow: if(private_fina...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 05 Control flow: if(private_t) a...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 06 Control flow: if(private_fina...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 07 Control flow: if(private_five...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 08 Control flow: if(private_retu...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 09 Control flow: if(IO.static_fi...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 10 Control flow: if(IO.static_t)...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 11 Control flow: if(IO.static_re...