Deprecated test suite
Juliet Java 1.0 with extra support Test suite #69
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 106 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 5451 - 5475 of 14184 in total
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 15 Control flow: switch(7)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of Broken or Risky Cryptographic Algorithm Sinks: GoodSink: use AES BadSink : use DES Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 01 Baseline
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 328 Bad case uses insecure cryptographic hashing algorithm (MD5). Good case uses secure cryptographic hashing algorithm (SHA-512). Sinks: GoodSink: sha512 BadSink : md5 Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())