Deprecated test suite
Juliet Java 1.2 Test suite #85
DownloadDescription
A collection of test cases in the Java language. It contains examples for 112 different CWEs.
All documents related to the Juliet Test Suite can be found at the documents page.
This software is not subject to copyright protection and is in the public domain. NIST assumes no responsibility whatsoever for its use by other parties, and makes no guaranties, expressed or implied, about its quality, reliability, or any other characteristic.
Documentation
Displaying test cases 17701 - 17725 of 25477 in total
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE_STATIC_FINAL_FALSE)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIVATE_STATIC_FINAL_FIVE!=5)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFive!=5)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(privateReturnsFalse())
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO.STATIC_FINAL_FALSE)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticFalse)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(IO.staticReturnsFalse())
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC_FINAL_FIVE!=5)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.staticFive!=5)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 15 Control flow: switch(7)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 16 Control flow: while(true)
-
CWE: 598 Information Exposure Through Query Strings in GET Request Sinks: GoodSink: post password field BadSink : get password field Flow Variant: 17 Control flow: for loops
-
A Servlet fails to catch all exceptions, which may reveal sensitive debugging information.
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 01 Baseline
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE_STATIC_FINAL_FALSE)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIVATE_STATIC_FINAL_FIVE!=5)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFive!=5)
-
CWE: 601 Open Redirect BadSource: File Read data from file (named c:\data.txt) GoodSource: A hardcoded string BadSink: place redirect string directly into redirect api call Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(privateReturnsFalse())