Deprecated test suite
Juliet Java 1.0 with extra support Test suite #69
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 106 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 2026 - 2050 of 14184 in total
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 05 Control flow: if(pri...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 06 Control flow: if(pri...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 07 Control flow: if(pri...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 08 Control flow: if(pri...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 09 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 10 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 11 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 12 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 13 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 14 Control flow: if(IO....
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 15 Control flow: switch(6)
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 16 Control flow: while(...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 17 Control flow: for loops
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 19 Control flow: Dead c...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 31 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 41 Data flow: data pass...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 42 Data flow: data retu...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 45 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string BadSink: badSanitization String.replaceAll sanitization Flow Variant: 51 Data flow: data pass...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 52 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 53 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 54 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 61 Data flow: ...
-
CWE: 182 Attempt to sanitize user input collapses data into an unsafe expression BadSource: getQueryStringServlet Parse id param out of the querystring without getParam GoodSource: A hardcoded string Sinks: badSanitization BadSink : String.replaceAll sanitization Flow Variant: 66 Data flow: ...