Juliet C/C++ 1.0 Test suite #25
DownloadDescription
A collection of test cases in the C/C++ language. It contains examples for 116 different CWEs. This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic. All documents related to the Juliet Test Suite can be found at the documents page.
Documentation
Displaying test cases 23876 - 23900 of 45309 in total
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 16 Control flow: while(1) and while(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 18 Control flow: goto statements
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 19 Control flow: Dead code after a return
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 01 Baseline
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 04 Control flow: if(static_const_t) and if(static_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 05 Control flow: if(static_t) and if(static_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 06 Control flow: if(static_const_five==5) and if(static_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 07 Control flow: if(static_five==5) and if(static_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 08 Control flow: if(static_returns_t()) and if(static_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 09 Control flow: if(global_const_t) and if(global_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 10 Control flow: if(global_t) and if(global_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 11 Control flow: if(global_returns_t()) and if(global_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 12 Control flow: if(global_returns_t_or_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 13 Control flow: if(global_const_five==5) and if(global_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 14 Control flow: if(global_five==5) and if(global_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 15 Control flow: switch(6)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 16 Control flow: while(1) and while(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 18 Control flow: goto statements
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 19 Control flow: Dead code after a return
-
CWE: 328 Reversible Oneway Hash Sinks: GoodSink: Use SHA1 as a hashing algorithm BadSink : Use Adler32 CRC to hash the password Flow Variant: 01 Baseline
-
CWE: 328 Reversible Oneway Hash Sinks: GoodSink: Use SHA1 as a hashing algorithm BadSink : Use Adler32 CRC to hash the password Flow Variant: 02 Control flow: if(1) and if(0)