Deprecated test suite
Juliet Java 1.0 with extra support Test suite #69
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 106 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 1976 - 2000 of 14184 in total
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 31 Data flow: make a copy of data within ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 41 Data flow: data passed as an argument from one ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 42 Data flow: data returned from one method to ano...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 45 Data flow: data passed as a private cl...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 51 Data flow: data passed as an argument from one ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 52 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 54 Data flow: data passed as an argument ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 61 Data flow: data returned from one meth...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 66 Data flow: data passed in an array fro...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 67 Data flow: data passed in a class from...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 68 Data flow: data passed as a member variable in ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getCookiesServlet Read data from the first cookie GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 71 Data flow: data passed as an Object re...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 01 Baseline
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 02 Control flow: if(true) and if...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 03 Control flow: if(5==5) and if...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 04 Control flow: if(private_fina...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 05 Control flow: if(private_t) a...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 06 Control flow: if(private_fina...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 07 Control flow: if(private_five...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 08 Control flow: if(private_retu...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 09 Control flow: if(IO.static_fi...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 10 Control flow: if(IO.static_t)...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getParameterServlet Read data from a querystring using getParameter GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 11 Control flow: if(IO.static_re...