Deprecated test suite
Juliet Java 1.0 with extra support Test suite #69
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 106 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 5576 - 5600 of 14184 in total
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 01 Baseline
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 04 Control flow: if(private_final_t) and if(private_final_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 06 Control flow: if(private_final_five==5) and if(private_final_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 07 Control flow: if(private_five==5) and if(private_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 08 Control flow: if(private_returns_t()) and if(private_returns_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.static_final_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_f...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 17 Control flow: for loops
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 31 Data flow: make a copy of data within the same method
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 41 Data flow: data passed as an argument from one method to another i...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 42 Data flow: data returned from one method to another in the same class
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 45 Data flow: data passed as a private class member variable from one...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 51 Data flow: data passed as an argument from one function to another...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 52 Data flow: data passed as an argument from one method to another t...
-
CWE: 352 Cross Site Request Forgery BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: GoodSink: using CSRF prevention nonce BadSink : no CSRF prevention token Flow Variant: 53 Data flow: data passed as an argument from one method to another t...