Description
CWE: 89 SQL Injection
BadSource: URLConnection Read data from a web server with URLConnection
GoodSource: A hardcoded string
Sinks: executeQuery
GoodSink: Use prepared statement and executeQuery (properly)
BadSink : data concatenated into SQL statement used in executeQuery(), which could result in SQL Injection
Flow Variant: 06 Control flow: if(PRIVATE_STATIC_FINAL_FIVE==5) and if(PRIVATE_STATIC_FINAL_FIVE!=5)
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.