Deprecated test suite
Juliet Java 1.0 with extra support Test suite #69
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 106 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 1951 - 1975 of 14184 in total
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 13 Control flow: if(IO.static_final_five==5) and if(IO.static_final_five!=5)
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.static_five!=5)
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 15 Control flow: switch(7)
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 17 Control flow: for loops
-
CWE: 180 Incorrect Order Sinks: incOrderServlet GoodSink: canonicalize before validate BadSink : validate before canonicalize Flow Variant: 19 Control flow: Dead code after an if(true) return
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 01 Baseline
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 04 Control flow: if(private_final_t) and if(privat...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 05 Control flow: if(private_t) and if(private_f)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 06 Control flow: if(private_final_five==5) and if(...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 07 Control flow: if(private_five==5) and if(privat...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 08 Control flow: if(private_returns_t()) and if(pr...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 09 Control flow: if(IO.static_final_t) and if(IO.s...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 10 Control flow: if(IO.static_t) and if(IO.static_f)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 12 Control flow: if(IO.static_returns_t_or_f())
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 13 Control flow: if(IO.static_final_five==5) and i...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 14 Control flow: if(IO.static_five==5) and if(IO.s...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 15 Control flow: switch(6)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 16 Control flow: while(true) and while(local_f)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 17 Control flow: for loops
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 19 Control flow: Dead code after an if(true) return