SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Results: 160 test cases in 8 pages. Pages: 1 2 3 4 5 6 7 8
Go to page:

Select Test Case ID(up) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
1551102015-10-06JavaSource CodeCandidate This test takes in a value from a taint source,. and creates a ...CWE-190: Integer Overflow or Wraparound
Bad test case
1550972015-10-06JavaSource CodeCandidate This test takes in a value from a taint source,. which is then usedtCWE-194: Unexpected Sign Extension
Bad test case
1550822015-10-06JavaSource CodeCandidate This test takes in a char value from a taint source. The value ...CWE-196: Unsigned to Signed Conversion Error
Bad test case
1550792015-10-06JavaSource CodeCandidate This test takes in a char value from a taint source. The value ...CWE-196: Unsigned to Signed Conversion Error
Bad test case
1550732015-10-06JavaSource CodeCandidate This test takes in a value from a taint source.. The value is ...CWE-197: Numeric Truncation Error
Bad test case
1550652015-10-06JavaSource CodeCandidate This test takes in a value passed in as an. argument and uses it tocCWE-369: Divide By Zero
Bad test case
1550122015-10-06JavaSource CodeCandidate This test takes in a value from a taint source.. The value is ...CWE-197: Numeric Truncation Error
Bad test case
1549542015-10-06JavaSource CodeCandidate This test takes in a value passed as an argument. This value is ...CWE-195: Signed to Unsigned Conversion Error
Bad test case
1548872015-10-06JavaSource CodeCandidate A file name is provided to the application. This file is assumed ...CWE-572: Call to Thread run() instead of start()
Bad test case
1548802015-10-06JavaSource CodeCandidate This test takes an integer followed by a filename as input (int ...CWE-363: Race Condition Enabling Link Following
Bad test case
1548452015-10-06JavaSource CodeCandidate This weakness takes in an integer and string "int ...CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context
Bad test case
1548222015-10-06JavaSource CodeCandidate This weakness takes in an integer and string "int ...CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context
Bad test case
1548202015-10-06JavaSource CodeCandidate This weakness takes an integer and string as input (int string) ...CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Bad test case
1548072015-10-06JavaSource CodeCandidate A file name is provided to the application. This file is assumed ...CWE-572: Call to Thread run() instead of start()
Bad test case
1547962015-10-06JavaSource CodeCandidate This weakness takes a string in the form: '<qsize> ...CWE-414: Missing Lock Check
Bad test case
1547842015-10-06JavaSource CodeCandidate This weakness takes an input of "<qsize> ...CWE-609: Double-Checked Locking
Bad test case
1547712015-10-06JavaSource CodeCandidate This test takes a string. It locks a lock upon encountering the ...CWE-765: Multiple Unlocks of a Critical Resource
Bad test case
1547542015-10-06JavaSource CodeCandidate This weakness takes a string in the form: '<qsize> ...CWE-414: Missing Lock Check
Bad test case
1547502015-10-06JavaSource CodeCandidate This test takes a filename that is used as a representation of ...CWE-412: Unrestricted Externally Accessible Lock
Bad test case
1547242015-10-06JavaSource CodeCandidate Algorithmic variant: basic. Root cause: none. This test takes a ...CWE-820: Missing Synchronization
Bad test case
1 2 3 4 5 6 7 8
Total of selected test cases: 160
Total pages: 8