SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Results: 476 test cases in 24 pages. Pages: First << ... 4 5 6 7 8 9 10 11 12 ... >> Last
Go to page:

Select Test Case ID(down) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
1548242015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1548262015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-764: Multiple Locks of a Critical Resource
Bad test case
1548372015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-832: Unlock of a Resource that is not Locked
Bad test case
1548392015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-765: Multiple Unlocks of a Critical Resource
Bad test case
1548432015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1548462015-10-06JavaSource CodeCandidate This weakness takes an integer, two file names, and an integer ...CWE-543: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Bad test case
1548502015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-832: Unlock of a Resource that is not Locked
Bad test case
1548622015-10-06JavaSource CodeCandidate This weakness takes in an integer and string "int ...CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context
Bad test case
1548672015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1548702015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-765: Multiple Unlocks of a Critical Resource
Bad test case
1548782015-10-06JavaSource CodeCandidate This weakness takes a string in the form: '<qsize> ...CWE-414: Missing Lock Check
Bad test case
1548822015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1548992015-10-06JavaSource CodeCandidate Algorithmic variant: basic. Root cause: none. This test takes a ...CWE-820: Missing Synchronization
Bad test case
1549052015-10-06JavaSource CodeCandidate This weakness takes an integer, two file names, and an integer ...CWE-543: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Bad test case
1549072015-10-06JavaSource CodeCandidate A file name is provided to the application. This file is assumed ...CWE-572: Call to Thread run() instead of start()
Bad test case
1549142015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-764: Multiple Locks of a Critical Resource
Bad test case
1549192015-10-06JavaSource CodeCandidate Algorithmic variant: basic. Root cause: none. This test takes a ...CWE-820: Missing Synchronization
Bad test case
1549212015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-764: Multiple Locks of a Critical Resource
Bad test case
1549302015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-765: Multiple Unlocks of a Critical Resource
Bad test case
1549432015-10-06JavaSource CodeCandidate This test takes in a value from a taint source,. and creates a ...CWE-190: Integer Overflow or Wraparound
Bad test case
First << ... 4 5 6 7 8 9 10 11 12 ... >> Last
Total of selected test cases: 476
Total pages: 24