Deprecated test suite
Juliet Java 1.2 with extra support Test suite #87
DownloadDescription
This is a collection of test cases in the Java language. It contains examples for 112 different CWEs.NOTE: This package contains only individual test cases. We recommend to download the full test suite at the top of the "Test Suite" page. All documents related to the Juliet Test Suite can be found at the documents page
Displaying test cases 19001 - 19025 of 25477 in total
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 71 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 72 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 73 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 74 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 75 Data f...
-
CWE: 643 Xpath Injection BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter()) GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 81 Data f...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 01 Baseline
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 02 Control flow: if(true) and if(false)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 04 Control flow: if(PRIVATE_STATIC_FINAL_TRUE) and i...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 05 Control flow: if(privateTrue) and if(privateFalse)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) an...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 07 Control flow: if(privateFive==5) and if(privateFi...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 08 Control flow: if(privateReturnsTrue()) and if(pri...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 09 Control flow: if(IO.STATIC_FINAL_TRUE) and if(IO....
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 10 Control flow: if(IO.staticTrue) and if(IO.staticF...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 11 Control flow: if(IO.staticReturnsTrue()) and if(I...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 12 Control flow: if(IO.staticReturnsTrueOrFalse())
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 14 Control flow: if(IO.staticFive==5) and if(IO.stat...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 15 Control flow: switch(6) and switch(7)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 16 Control flow: while(true)
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 17 Control flow: for loops
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 21 Control flow: Flow controlled by value of a priva...
-
CWE: 643 Xpath Injection BadSource: listen_tcp Read data using a listening tcp connection GoodSource: A hardcoded string Sinks: GoodSink: validate input through StringEscapeUtils BadSink : user input is used without validate Flow Variant: 22 Control flow: Flow controlled by value of a publi...