Skip to content

add Rce.java

f0dec06
Select commit
Loading
Failed to load commit list.
Open

add Rce.java #3

add Rce.java
f0dec06
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / SonarCloud succeeded Mar 16, 2025 in 3s

No new alerts in code changed by this pull request

Annotations

Check failure on line 36 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWdywI1eLlEgZLMQtWt-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWdywI1eLlEgZLMQtWt&open=AZWdywI1eLlEgZLMQtWt&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 69 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWdywI1eLlEgZLMQtWs-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWdywI1eLlEgZLMQtWs&open=AZWdywI1eLlEgZLMQtWs&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 100 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

Dynamic code execution should not be vulnerable to injection attacks

<!--SONAR_ISSUE_KEY:AZWdywI1eLlEgZLMQtWu-->Change this code to not dynamically execute code influenced by user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWdywI1eLlEgZLMQtWu&open=AZWdywI1eLlEgZLMQtWu&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 36 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWiEIx5GaQdYdx2B2UD-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEIx5GaQdYdx2B2UD&open=AZWiEIx5GaQdYdx2B2UD&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 69 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWiEIx5GaQdYdx2B2UC-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEIx5GaQdYdx2B2UC&open=AZWiEIx5GaQdYdx2B2UC&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 100 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

Dynamic code execution should not be vulnerable to injection attacks

<!--SONAR_ISSUE_KEY:AZWiEIx5GaQdYdx2B2UE-->Change this code to not dynamically execute code influenced by user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEIx5GaQdYdx2B2UE&open=AZWiEIx5GaQdYdx2B2UE&pullRequest=3">SonarQube Cloud</a></p>

Check failure on line 36 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWiEWIQAKPcbPrntm8Y-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEWIQAKPcbPrntm8Y&open=AZWiEWIQAKPcbPrntm8Y&pullRequest=7">SonarQube Cloud</a></p>

Check failure on line 69 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

OS commands should not be vulnerable to command injection attacks

<!--SONAR_ISSUE_KEY:AZWiEWIQAKPcbPrntm8Z-->Change this code to not construct the OS command from user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEWIQAKPcbPrntm8Z&open=AZWiEWIQAKPcbPrntm8Z&pullRequest=7">SonarQube Cloud</a></p>

Check failure on line 100 in src/main/java/org/joychou/controller/Rce2.java

See this annotation in the file changed.

Code scanning / SonarCloud

Dynamic code execution should not be vulnerable to injection attacks

<!--SONAR_ISSUE_KEY:AZWiEWIQAKPcbPrntm8a-->Change this code to not dynamically execute code influenced by user-controlled data. <p>See more on <a href="https://sonarcloud.io/project/issues?id=cccfeng_java-sec-code&issues=AZWiEWIQAKPcbPrntm8a&open=AZWiEWIQAKPcbPrntm8a&pullRequest=7">SonarQube Cloud</a></p>