Juliet C/C++ 1.0 Test suite #25
DownloadDescription
A collection of test cases in the C/C++ language. It contains examples for 116 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 23776 - 23800 of 45309 in total
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sink: BadSink : Authenticate the user using LogonUserW() Flow Variant: 51 Data...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sink: BadSink : Authenticate the user using LogonUserW() Flow Variant: 52 Data...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sink: BadSink : Authenticate the user using LogonUserW() Flow Variant: 53 Data...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sink: BadSink : Authenticate the user using LogonUserW() Flow Variant: 54 Data...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 61 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 63 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 64 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 65 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 66 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sinks: BadSink : Authenticate the user using LogonUserW() Flow Variant: 67 Dat...
-
CWE: 319 Plaintext Transmission of Sensitive Information BadSource: listen_socket Read the password using a listen socket (server side) GoodSource: Use a hardcoded password (one that was not sent over the network) Sink: BadSink : Authenticate the user using LogonUserW() Flow Variant: 68 Data...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 01 Baseline
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 04 Control flow: if(static_const_t) and if(static_const_f)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 05 Control flow: if(static_t) and if(static_f)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 06 Control flow: if(static_const_five==5) and if(static_const...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 07 Control flow: if(static_five==5) and if(static_five!=5)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 08 Control flow: if(static_returns_t()) and if(static_returns...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 09 Control flow: if(global_const_t) and if(global_const_f)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 10 Control flow: if(global_t) and if(global_f)
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 11 Control flow: if(global_returns_t()) and if(global_returns...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 12 Control flow: if(global_returns_t_or_f())
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 13 Control flow: if(global_const_five==5) and if(global_const...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 14 Control flow: if(global_five==5) and if(global_five!=5)