Deprecated test suite
Juliet C/C++ 1.0 with extra support Test suite #68
DownloadDescription
This is a collection of test cases in the C/C++ language. It contains examples for 116 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 23876 - 23900 of 45309 in total
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 16 Control flow: while(1) and while(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 18 Control flow: goto statements
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32rot13 GoodSink: Use Triple-DES for decryption BadSink : Decryption is done by rot13, which is not a safe cryptographic method Flow Variant: 19 Control flow: Dead code after a return
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 01 Baseline
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 04 Control flow: if(static_const_t) and if(static_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 05 Control flow: if(static_t) and if(static_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 06 Control flow: if(static_const_five==5) and if(static_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 07 Control flow: if(static_five==5) and if(static_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 08 Control flow: if(static_returns_t()) and if(static_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 09 Control flow: if(global_const_t) and if(global_const_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 10 Control flow: if(global_t) and if(global_f)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 11 Control flow: if(global_returns_t()) and if(global_returns_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 12 Control flow: if(global_returns_t_or_f())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 13 Control flow: if(global_const_five==5) and if(global_const_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 14 Control flow: if(global_five==5) and if(global_five!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 15 Control flow: switch(6)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 16 Control flow: while(1) and while(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 18 Control flow: goto statements
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: w32xor GoodSink: Use Triple-DES for decryption BadSink : Decrypt the block by XORing with the provided key Flow Variant: 19 Control flow: Dead code after a return
-
CWE: 328 Reversible Oneway Hash Sinks: GoodSink: Use SHA1 as a hashing algorithm BadSink : Use Adler32 CRC to hash the password Flow Variant: 01 Baseline
-
CWE: 328 Reversible Oneway Hash Sinks: GoodSink: Use SHA1 as a hashing algorithm BadSink : Use Adler32 CRC to hash the password Flow Variant: 02 Control flow: if(1) and if(0)