Deprecated test suite
Juliet C/C++ 1.2 with extra support Test suite #86
DownloadDescription
This is a collection of test cases in the C/C++ language. It contains examples for 118 different CWEs. NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 41651 - 41675 of 61387 in total
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 08 Control flow: if(staticReturnsTrue()) and if(staticReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 09 Control flow: if(GLOBAL_CONST_TRUE) and if(GLOBAL_CONST_FALSE)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 10 Control flow: if(globalTrue) and if(globalFalse)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 11 Control flow: if(globalReturnsTrue()) and if(globalReturnsFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 12 Control flow: if(globalReturnsTrueOrFalse())
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 13 Control flow: if(GLOBAL_CONST_FIVE==5) and if(GLOBAL_CONST_FIVE!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 14 Control flow: if(globalFive==5) and if(globalFive!=5)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 15 Control flow: switch(6)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 16 Control flow: while(1)
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 17 Control flow: for loops
-
CWE: 676 Use of Potentially Dangerous Function Sinks: GoodSink: Use cin after specifying the length of the input BadSink : Use cin without specifying the length of the input Flow Variant: 18 Control flow: goto statements
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow V...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant:...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: connect_socket Read data using a connect socket (client side) GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sink: BadSink : Attempt to allocate array using length value from source Flow Variant: 22 Cont...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 61 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 62 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 81 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink BadSink : Attempt to allocate array using length value from source Flow Variant: 82 Data flow: ...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 83 Dat...
-
CWE: 680 Integer Overflow to Buffer Overflow BadSource: fgets Read data from the console using fgets() GoodSource: Small number greater than zero that will not cause an integer overflow in the sink Sinks: BadSink : Attempt to allocate array using length value from source Flow Variant: 84 Dat...