Deprecated test suite
Juliet C/C++ 1.2 with extra support Test suite #86
DownloadDescription
This is a collection of test cases in the C/C++ language. It contains examples for 118 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 27376 - 27400 of 61387 in total
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: DES GoodSink: Use AES for decryption BadSink : Use DES for decryption Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: DES GoodSink: Use AES for decryption BadSink : Use DES for decryption Flow Variant: 18 Control flow: goto statements
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 01 Baseline
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 04 Control flow: if(STATIC_CONST_TRUE) and if(STATIC_CONST_FALSE)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 05 Control flow: if(staticTrue) and if(staticFalse)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 06 Control flow: if(STATIC_CONST_FIVE==5) and if(STATIC_CONST_FIVE!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 07 Control flow: if(staticFive==5) and if(staticFive!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 08 Control flow: if(staticReturnsTrue()) and if(staticReturnsFalse())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 09 Control flow: if(GLOBAL_CONST_TRUE) and if(GLOBAL_CONST_FALSE)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 10 Control flow: if(globalTrue) and if(globalFalse)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 11 Control flow: if(globalReturnsTrue()) and if(globalReturnsFalse())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 12 Control flow: if(globalReturnsTrueOrFalse())
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 13 Control flow: if(GLOBAL_CONST_FIVE==5) and if(GLOBAL_CONST_FIVE!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 14 Control flow: if(globalFive==5) and if(globalFive!=5)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 15 Control flow: switch(6)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 16 Control flow: while(1)
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 17 Control flow: for loops
-
CWE: 327 Use of a Broken or Risky Cryptographic Algorithm Sinks: RC5 GoodSink: Use AES for decryption BadSink : Use RC5 for decryption Flow Variant: 18 Control flow: goto statements
-
CWE: 328 Reversible One Way Hash Sinks: MD2 GoodSink: Use SHA-512 as a hashing algorithm BadSink : Use MD2 as a hashing algorithm Flow Variant: 01 Baseline
-
CWE: 328 Reversible One Way Hash Sinks: MD2 GoodSink: Use SHA-512 as a hashing algorithm BadSink : Use MD2 as a hashing algorithm Flow Variant: 02 Control flow: if(1) and if(0)
-
CWE: 328 Reversible One Way Hash Sinks: MD2 GoodSink: Use SHA-512 as a hashing algorithm BadSink : Use MD2 as a hashing algorithm Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 328 Reversible One Way Hash Sinks: MD2 GoodSink: Use SHA-512 as a hashing algorithm BadSink : Use MD2 as a hashing algorithm Flow Variant: 04 Control flow: if(STATIC_CONST_TRUE) and if(STATIC_CONST_FALSE)
-
CWE: 328 Reversible One Way Hash Sinks: MD2 GoodSink: Use SHA-512 as a hashing algorithm BadSink : Use MD2 as a hashing algorithm Flow Variant: 05 Control flow: if(staticTrue) and if(staticFalse)