SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security

View/Download Test Cases

Test Suite #27: MS

Results: 25 test cases in 2 pages. Pages: 1 2
Go to page:

Select Test Case ID(up) Submission Date Language Type of Artifact Status Description Weakness Bad
Good
Mixed
17552006-08-29JavaSource CodeCandidate Test of tool's ability to identify an assignment of public data ...CWE-496: Public Data Assigned to Private Array-Typed Field
Bad test case
17542006-08-28JavaSource CodeCandidate Private Array-Typed field returned from a public method.CWE-495: Private Array-Typed Field Returned From A Public Method
Bad test case
17402006-08-22JavaSource CodeCandidate Test of tool ability to identify an unchecked (unhandled) ...CWE-391: Unchecked Error Condition
Bad test case
17382006-08-18JavaSource CodeCandidate Test determines if a tool can identify a hardcoded password weaknessiCWE-259: Use of Hard-coded Password
Bad test case
17342006-08-15JavaSource CodeCandidate Test of tool to identify potential resource injection weakness ...CWE-099: Improper Control of Resource Identifiers ('Resource Injection')
Bad test case
16552006-06-22JavaSource CodeCandidate Tainted output allows cross-site scripting attack. (fixed version 2)CWE-079: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Good test case
16542006-06-22JavaSource CodeCandidate Tainted output allows cross-site scripting attack.CWE-079: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Good test case
16532006-06-22JavaSource CodeCandidate Tainted output allows cross-site scripting attack.CWE-079: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Bad test case
16442006-06-22JavaSource CodeCandidate Tainted data spliced into a SQL query leads to a SQL injection issue CWE-074: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Good test case
16432006-06-22JavaSource CodeCandidate Tainted data spliced into a SQL query leads to a SQL injection issue.CWE-089: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Bad test case
15972006-06-22JavaSource CodeCandidate Tainted input allows command execution. (fixed version)CWE-077: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Good test case
15962006-06-22JavaSource CodeCandidate Tainted input allows command execution.CWE-077: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Bad test case
15842006-06-22JavaSource CodeCandidate Memory resources are referenced indefinitely but never used ...CWE-401: Improper Release of Memory Before Removing Last Reference ('Memory Leak')
Good test case
15832006-06-22JavaSource CodeCandidate Memory resources are referenced indefinitely but never used ...CWE-401: Improper Release of Memory Before Removing Last Reference ('Memory Leak')
Bad test case
15822006-06-22JavaSource CodeCandidate Tainted output allows log entries to be forged. (fixed version)None givenGood test case
15812006-06-22JavaSource CodeCandidate Tainted output allows log entries to be forged.None givenBad test case
15802006-06-22JavaSource CodeCandidate Tainted output allows log entries to be forged. (fixed version)None givenGood test case
15792006-06-22JavaSource CodeCandidate Tainted output allows log entries to be forged.None givenBad test case
15712006-06-22JavaSource CodeCandidate An exception leaks internal path information to the user. (fixed ...None givenGood test case
15702006-06-22JavaSource CodeCandidate An exception leaks internal path information to the user.None givenBad test case
1 2
Total of selected test cases: 25
Total pages: 2