SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Results: 160 test cases in 8 pages. Pages: 1 2 3 4 5 6 7 8
Go to page:

Select Test Case ID(up) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
1548112015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1548042015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1547932015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1547862015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-832: Unlock of a Resource that is not Locked
Bad test case
1547802015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1547562015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1546852015-10-06JavaSource CodeCandidate This weakness takes in an integer and string "int ...CWE-821: Incorrect Synchronization
Bad test case
1546742015-10-06JavaSource CodeCandidate This weakness takes a string in the form: '<qsize> ...CWE-414: Missing Lock Check
Bad test case
1546662015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-765: Multiple Unlocks of a Critical Resource
Bad test case
1546542015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-764: Multiple Locks of a Critical Resource
Bad test case
1546422015-10-06JavaSource CodeCandidate This weakness takes an integer, two file names, and an integer ...CWE-543: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Bad test case
1546332015-10-06JavaSource CodeCandidate This weakness takes a string in the form: '<qsize> ...CWE-414: Missing Lock Check
Bad test case
1546202015-10-06JavaSource CodeCandidate This test takes an integer and filename as input (int filename), andcCWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
Bad test case
1546142015-10-06JavaSource CodeCandidate This test takes an integer followed by a filename as input (int ...CWE-363: Race Condition Enabling Link Following
Bad test case
1546072015-10-06JavaSource CodeCandidate This test takes an integer followed by a filename as input (int ...CWE-363: Race Condition Enabling Link Following
Bad test case
1545392015-10-06JavaSource CodeCandidate This weakness takes in an integer and string "int ...CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context
Bad test case
1545052015-10-06JavaSource CodeCandidate This test takes a filename that is used as a representation of ...CWE-412: Unrestricted Externally Accessible Lock
Bad test case
1545022015-10-06JavaSource CodeCandidate This test takes a filename that is used as a representation of ...CWE-412: Unrestricted Externally Accessible Lock
Bad test case
1545002015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1544862015-10-06JavaSource CodeCandidate This weakness takes an integer, two file names, and an integer ...CWE-543: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Bad test case
1 2 3 4 5 6 7 8
Total of selected test cases: 160
Total pages: 8