Skip to content

Veracode-Fix-Bot - update src/main/java/com/veracode/verademo/command…

276f539
Select commit
Loading
Failed to load commit list.
Sign in for the full log view
Open

Veracode Batch Fix #2245

Veracode-Fix-Bot - update src/main/java/com/veracode/verademo/command…
276f539
Select commit
Loading
Failed to load commit list.
GitHub Actions / Veracode Fix - Scan Findings succeeded Feb 27, 2026 in 1s

Veracode Fix - Scan Findings

Found 13 scan findings aligned with applied fixes

Details

Found 13 scan findings aligned with applied fixes

Annotations

Check warning on line 51 in src/main/java/com/veracode/verademo/commands/RemoveAccountCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 51**

**Issue ID:** 1009
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.execute() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to execute() contains tainted data from the variable sqlQuery. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 40 in src/main/java/com/veracode/verademo/commands/RemoveAccountCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 40**

**Issue ID:** 1012
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sqlQuery. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 47 in src/main/java/com/veracode/verademo/commands/RemoveAccountCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 47**

**Issue ID:** 1007
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.execute() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to execute() contains tainted data from the variable sqlQuery. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 47 in src/main/java/com/veracode/verademo/commands/IgnoreCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 47**

**Issue ID:** 1005
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.execute() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to execute() contains tainted data from the variable sqlQuery. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 40 in src/main/java/com/veracode/verademo/commands/IgnoreCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 40**

**Issue ID:** 1010
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sqlQuery. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 167 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 167**

**Issue ID:** 1013
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sqlQuery. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 248 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 248**

**Issue ID:** 1015
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sql. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 310 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 310**

**Issue ID:** 1014
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sql. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 483 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 483**

**Issue ID:** 1016
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sqlMyEvents. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 494 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 494**

**Issue ID:** 1025
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.PreparedStatement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. executeQuery() was called on the myInfo object, which contains tainted data. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 495 in src/main/java/com/veracode/verademo/controller/UserController.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 495**

**Issue ID:** 1025
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.PreparedStatement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. executeQuery() was called on the myInfo object, which contains tainted data. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 40 in src/main/java/com/veracode/verademo/commands/ListenCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 40**

**Issue ID:** 1011
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to executeQuery() contains tainted data from the variable sqlQuery. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.

Check warning on line 47 in src/main/java/com/veracode/verademo/commands/ListenCommand.java

See this annotation in the file changed.

@github-actions github-actions / Veracode Fix - Scan Findings

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Severity: 4)

**Security finding fixed on line 47**

**Issue ID:** 1006
**CWE:** 89
**Issue Type:** Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
**Severity:** 4

**Description:**
<span>This database query contains a SQL injection flaw.  The call to java.sql.Statement.execute() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to execute() contains tainted data from the variable sqlQuery. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery.</span> <span>Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a></span>

This finding was addressed in the applied patch.