奇安信CodeSafe
奇安信CodeSafe
https://github.com/google/goexpect/blob/c416f18ae5af08f6c8e6b116ab427441cc67a593/expect.go#L1262-L1264 The `switch case` block does not require `break`. If `break` `for loop`, you need a label.
https://github.com/gephi/gephi/blob/936a659bbd23c4e5f8abf48f8a1f30a0a079458b/modules/SettingsUpgrader/src/main/java/org/gephi/ui/upgrader/CopyFiles.java#L75 The program can potentially fail to release a system resource.
https://github.com/bilibili/boxing/blob/bd1eeff8405a74c201ca489d6f753e306e84d195/boxing-impl/src/main/java/com/bilibili/boxing_impl/view/MediaItemLayout.java#L48 This field is never used.
https://github.com/bilibili/boxing/blob/bd1eeff8405a74c201ca489d6f753e306e84d195/boxing/src/main/java/com/bilibili/boxing/utils/ImageCompressor.java#L323 Weak cryptographic hashes cannot guarantee data integrity and should not be used in security-critical contexts.
https://github.com/Meituan-Dianping/Robust/blob/955adcc21e4fbcb52054a8f7f4bbb11f462aeb2f/autopatchbase/src/main/java/com/meituan/robust/utils/PatchTemplate.java#L18 This field is never used
sql注入
您好: 我是360代码卫士的工作人员,在我们的开源代码检测项目中发现Movie_Recommend存在sql注入漏洞。 详细信息如下: 在indexController.java文件的showtypesortmovie()中接受了请求中的sort参数并绑定到Selectquery对象中  最后调用了SortMoiveBycategory方法,跟进该方法对应的xml  由于mybatis中order by 后面的参数如果是用的#,排序将不起效果,所以开发人员用的$,但这样同时也导致了sql注入的存在。 复现:略 修复方法:在java层面上做映射,比如说用户只能输入1-5,然后在代码层面将其映射为字段名,然后再使用${}
https://github.com/google/android-classyshark/blob/9c61d6df79c971a0b6c83795e7a91f2a375585cf/ClassySharkWS/build.gradle#L42 CVE-2018-20200 Recommended upgrade version:3.12.1
https://github.com/google/android-classyshark/blob/9c61d6df79c971a0b6c83795e7a91f2a375585cf/ClassySharkWS/build.gradle#L41 CVE-2018-10237 CVE-2020-8908 Recommended upgrade version:24.1.1.jre
https://github.com/google/android-classyshark/blob/9c61d6df79c971a0b6c83795e7a91f2a375585cf/ClassySharkWS/build.gradle#L44 CVE-2018-1000850 Recommended upgrade version: 2.5.0
xxe
The xml external entity is not disabled when parsing the xml string. When analyzing malicious apk or app, it may cause xml external entity injection. 