Deprecated test suite
Juliet Java 1.2 with extra support Test suite #87
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 112 different CWEs.NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 11726 - 11750 of 25477 in total
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 54 Data flow: data passed as an argument from one method t...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 61 Data flow: data returned from one method to another in ...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 66 Data flow: data passed in an array from one method to a...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 67 Data flow: data passed in a class from one method to an...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 68 Data flow: data passed as a member variable in the a cl...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 71 Data flow: data passed as an Object reference argument ...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 72 Data flow: data passed in a Vector from one method to a...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 73 Data flow: data passed in a LinkedList from one method ...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 74 Data flow: data passed in a HashMap from one method to ...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 75 Data flow: data passed in a serialized object from one ...
-
CWE: 319 Cleartext Transmission of Sensitive Information BadSource: Establish data as a password GoodSource: Use a regular string (non-sensitive string) Sinks: GoodSink: encrypted channel BadSink : unencrypted channel Flow Variant: 81 Data flow: data passed in a parameter to an abstract me...
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 01 Baseline
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and if(PRIVATE_STATIC_FINAL_FALSE)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIVATE_STATIC_FINAL_FIVE!=5)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFive!=5)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(privateReturnsFalse())
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO.STATIC_FINAL_FALSE)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticFalse)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(IO.staticReturnsFalse())
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC_FINAL_FIVE!=5)
-
CWE: 321 Hard coded crypto key BadSource: Set data to a hardcoded value GoodSource: Read data from the console using readLine() BadSink: Use data as a cryptographic key Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.staticFive!=5)