Juliet C/C++ 1.0 Test suite #25
DownloadDescription
A collection of test cases in the C/C++ language. It contains examples for 116 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 23851 - 23875 of 45309 in total
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 52 Data flow: data passed as an argument from one function to...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 53 Data flow: data passed as an argument from one function th...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 54 Data flow: data passed as an argument from one function th...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 61 Data flow: data returned from one function to another in ...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 63 Data flow: pointer to data passed from one function to an...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 64 Data flow: void pointer to data passed from one function ...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 65 Data/control flow: data passed as an argument from one fu...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 66 Data flow: data passed in an array from one function to a...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sinks: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 67 Data flow: data passed in a struct from one function to a...
-
CWE: 321 Use of Hard-coded Cryptographic Key BadSource: hardcoded Copy a hardcoded value into cryptokey GoodSource: Read cryptokey from the console Sink: BadSink : Hash cryptokey and use the value to encrypt a string Flow Variant: 68 Data flow: data passed as a global variable from one funct...
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 01 Baseline
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 04 Control flow: if(static_const_t) and if(static_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 05 Control flow: if(static_t) and if(static_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 06 Control flow: if(static_const_five==5) and if(static_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 07 Control flow: if(static_five==5) and if(static_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 08 Control flow: if(static_returns_t()) and if(static_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 09 Control flow: if(global_const_t) and if(global_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 10 Control flow: if(global_t) and if(global_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 11 Control flow: if(global_returns_t()) and if(global_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 12 Control flow: if(global_returns_t_or_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 13 Control flow: if(global_const_five==5) and if(global_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 14 Control flow: if(global_five==5) and if(global_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 15 Control flow: switch(6)