Instruction stringclasses 1
value | Input stringlengths 79 33k | Response stringlengths 106 9.29k | __index_level_0__ int64 0 2.83k |
|---|---|---|---|
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD list_by_type.
SELECT * FROM (c_tabname)
INTO TABLE rt_content
WHERE type = iv_type
ORDER BY PRIMARY KEY. "#EC CI_SUBRC
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
METHOD list_by_type.
SELECT * FROM (c_tabname) * <-- There is a problem here
INTO TABLE rt_content
```
Explanation: Potential dangerous statement Dynamic SQL. | 322 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD modify.
DATA: ls_content TYPE zif_abapgit_persistence=>ty_content.
lock( iv_type = iv_type
iv_value = iv_value ).
ls_content-type = iv_type.
ls_content-value = iv_value.
ls_content-data_str = iv_data.
MODIFY (c_tabname) FROM ls_content.
IF sy-subrc <> 0.
zcx_a... | I found vulnerabilities in the line:
```abap
MODIFY (c_tabname) FROM ls_content.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 323 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD read.
SELECT SINGLE data_str FROM (c_tabname) INTO rv_data
WHERE type = iv_type
AND value = iv_value.
IF sy-subrc <> 0.
RAISE EXCEPTION TYPE zcx_abapgit_not_found.
ENDIF.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
SELECT SINGLE data_str FROM (c_tabname) INTO rv_data
```
Explanation: Potential dangerous statement Dynamic SQL. | 324 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD update.
DATA lv_data LIKE iv_data.
lv_data = validate_and_unprettify_xml( iv_data ).
lock( iv_type = iv_type
iv_value = iv_value ).
UPDATE (c_tabname) SET data_str = lv_data
WHERE type = iv_type
AND value = iv_value.
IF sy-subrc <> 0.
zcx_abapgit_exception... | I found vulnerabilities in the line:
```abap
UPDATE (c_tabname) SET data_str = lv_data
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 325 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE abap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT.
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous stat... | 326 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF NOT it_tpool[] IS INITIAL.
INSERT TEXTPOOL is_progdir-name
FROM it_tpool
LANGUAGE mv_language
STATE 'I'.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT TEXTPOOL' ).
ENDIF.
``` | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL is_progdir-name
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 327 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF iv_is_include = abap_false OR lv_state = 'A'.
DELETE TEXTPOOL iv_program "Remove initial description from textpool if
LANGUAGE iv_program "original program does not have a textpool
STATE lv_state.
lv_delete = abap_true.
ELSE.
``` | I found vulnerabilities in the line:
```abap
DELETE TEXTPOOL iv_program
```
Explanation: Potential dangerous statement DELETE TEXTPOOL. | 328 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF it_tpool IS INITIAL.
IF iv_is_include = abap_false OR lv_state = 'A'.
DELETE TEXTPOOL iv_program "Remove initial description from textpool if
LANGUAGE iv_program "original program does not have a textpool
STATE lv_state.
lv_delete = abap_true.
ELSE.
INSERT TEXTPOOL i... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT TEXTPOOL iv_program "In case of includes: Deletion of textpool in * <-- There is a problem here
FROM it_tpool
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 329 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
DATA lv_state TYPE c.
DATA lv_delete TYPE abap_bool.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
IF lv_language = mv_language.
lv_state = 'I'. "Textpool in m... | I found vulnerabilities in the line:
```abap
ENDIF.
INSERT TEXTPOOL iv_program * <-- There is a problem here
FROM it_tpool
LANGUAGE lv_language
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 330 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_type IMPLEMENTATION.
METHOD create.
DATA: lv_progname TYPE reposrc-progname,
lv_typegroup TYPE rsedd0-typegroup.
lv_typegroup = ms_item-obj_name.
CALL FUNCTION 'RS_DD_TYGR_INSERT_SOURCES'
EXPORTING
typegroupname = lv_typeg... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 331 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF strlen( is_progdir-name ) > 30.
" special treatment for extensions
" if the program name exceeds 30 characters it is not a usual
" ABAP program but might be some extension, which requires the internal
" addition EXTENSION TYPE, see
" http://help.sap.com/abapdocu_751/en/abapinsert_report_intern... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 332 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE sap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 333 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF NOT it_tpool[] IS INITIAL.
INSERT TEXTPOOL is_progdir-name
FROM it_tpool
LANGUAGE mv_language
STATE 'I'.
IF sy-subrc <> 0.
lcx_exception=>raise( 'error from INSERT TEXTPOOL' ).
ENDIF.
``` | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL is_progdir-name
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 334 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 0 AND is_progdir-varcl = space AND ls_progdir_new-varcl = abap_true.
* function module UPDATE_PROGDIR does not update VARCL
UPDATE progdir SET varcl = is_progdir-varcl
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
UPDATE progdir SET varcl = is_progdir-varcl
```
Explanation: Modify only own DB tables. | 335 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
READ TABLE it_tpool WITH KEY id = 'R' TRANSPORTING NO FIELDS.
IF ( sy-subrc = 0 AND lines( it_tpool ) = 1 ) OR lines( it_tpool... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL iv_program
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 336 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA: lv_cp TYPE program,
lv_clsname TYPE seoclsname,
lt_tpool_ext TYPE ty_tpool_tt,
lt_tpool TYPE textpool_table.
io_xml->read( EXPORTING iv_name = 'TPOOL'
CHANGING cg_data = lt_tpool_ext ).
lt_tpool = read_tpo... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL lv_cp
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 337 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_EXISTS'
EXPORTING
funcname = <ls_func>-funcname
IMPORTING
include = lv_include
EXCEPTIO... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 338 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
READ TABLE it_tpool WITH KEY id = 'R' TRANSPORTING NO FIELDS.
IF ( sy-subrc = 0 AND lines( it_tpool ) = 1 ) OR lines( it_tpool ) = 0.
RETURN. " no action for includes
ENDIF.
INSERT TEXTPOOL ms_item-obj_name
FROM it_tpool
LANGUAGE mv_language
STATE... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL ms_item-obj_name
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 339 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE sap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name
```
Explanation: Potential dangerous statement INSERT REPORT. | 340 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_model.
DATA ls_dm40l TYPE dm40l.
io_xml->read( EXPORTING iv_name = 'DM40L'
CHANGING cg_data = ls_dm40l ).
" See SDU_MODEL_PUT
GET TIME.
ls_dm40l-flg_frame = abap_true.
ls_dm40l-fstdate = sy-datum.
ls_dm40l-fsttime = sy-uzeit.
ls_dm40l-f... | I found vulnerabilities in the line:
```abap
MODIFY dm40l FROM ls_dm40l.
```
Explanation: Modify only own DB tables. | 342 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF ls_dm40t-langbez NE ls_udmo_text-langbez.
ls_dm40t-langbez = ls_udmo_text-langbez.
ls_dm40t-lstdate = sy-datum.
ls_dm40t-lsttime = sy-uzeit.
ls_dm40t-lstuser = sy-uname.
MODIFY dm40t FROM ls_dm40t.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
MODIFY dm40t FROM ls_dm40t.
```
Explanation: Modify only own DB tables. | 343 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT lt_udmo_texts INTO ls_udmo_text.
" Does the text already exist? This is the same logic as used
" in the FM SDU_MODEL_PUT
SELECT SINGLE *
FROM dm40t
INTO ls_dm40t
WHERE sprache EQ ls_udmo_text-sprache
AND dmoid EQ ls_udmo_text-dmoid
AND as4local EQ me->mv_activ... | I found vulnerabilities in the line:
```abap
INSERT dm40t FROM ls_dm40t.
```
Explanation: Modify only own DB tables. | 344 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS lcl_oo_class IMPLEMENTATION.
METHOD lif_oo_object_fnc~create.
CALL FUNCTION 'SEO_CLASS_CREATE_COMPLETE'
EXPORTING
devclass = iv_package
overwrite = iv_overwrite
CHANGING
class = is_properties
EXCEPTIONS
existing ... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL lv_cp
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 345 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_names... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 346 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 0 AND lv_tabclass = 'TRANSP'.
* it cannot delete table with table wihtout asking
CREATE DATA lr_data TYPE (lv_objname).
ASSIGN lr_data->* TO <ls_data>.
SELECT SINGLE * FROM (lv_objname) INTO <ls_data>.
IF sy-subrc = 0.
lv_no_ask = abap_false.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
SELECT SINGLE * FROM (lv_objname) INTO <ls_data>.
```
Explanation: Potential dangerous statement Dynamic SQL. | 347 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS lcl_object_type IMPLEMENTATION.
METHOD lif_object~has_changed_since.
rv_changed = abap_true.
ENDMETHOD. "lif_object~has_changed_since
METHOD lif_object~changed_by.
rv_user = c_user_unknown. " todo
ENDMETHOD.
METHOD lif_object~get_metadata.
rs_metadata = get_metadata( )... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 348 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF strlen( is_progdir-name ) > 30.
" special treatment for extensions
" if the program name exceeds 30 characters it is not a usual
" ABAP program but might be some extension, which requires the internal
" addition EXTENSION TYPE, see
" http://help.sap.com/abapdocu_751/en/abapinsert_report_intern... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 349 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE sap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 350 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 0 AND is_progdir-varcl = space AND ls_progdir_new-varcl = abap_true.
* function module UPDATE_PROGDIR does not update VARCL
UPDATE progdir SET varcl = is_progdir-varcl
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state. "#EC CI_SUBRC
ENDIF.
``` | I found vulnerabilities in the line:
```abap
UPDATE progdir SET varcl = is_progdir-varcl
```
Explanation: Modify only own DB tables. | 352 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
DATA lv_state TYPE c.
DATA lv_delete TYPE abap_bool.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
IF lv_language = mv_language.
lv_state = 'I'. "Textpool in m... | I found vulnerabilities in the line:
```abap
ENDIF.
INSERT TEXTPOOL iv_program * <-- There is a problem here
FROM it_tpool
LANGUAGE lv_language
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 355 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_namespace
group = lv... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 356 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_with_ext.
" Special treatment for extensions
" If the program name exceeds 30 characters it is not a usual ABAP program but might be
" some extension, which requires the internal addition EXTENSION TYPE
" https://help.sap.com/doc/abapdocu_755_index_htm/7.55/en-US/index.htm?file=... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name
```
Explanation: Potential dangerous statement INSERT REPORT. | 357 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 2.
" Drop also any inactive code that is left in REPOSRC
DELETE REPORT lv_program ##SUBRC_OK.
" Remove inactive objects from work area
lv_obj_name = lv_program.
CALL FUNCTION 'RS_DELETE_FROM_WORKING_AREA'
EXPORTING
object = 'REPS'
obj_name ... | I found vulnerabilities in the line:
```abap
DELETE REPORT lv_program ##SUBRC_OK.
```
Explanation: Potential dangerous statement DELETE REPORT. | 358 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF lt_old <> it_source.
INSERT REPORT iv_program FROM it_source.
ASSERT sy-subrc = 0.
rv_updated = abap_true.
ELSE.
``` | I found vulnerabilities in the line:
```abap
INSERT REPORT iv_program FROM it_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 359 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS lcl_oo_class IMPLEMENTATION.
METHOD lif_oo_object_fnc~create.
CALL FUNCTION 'SEO_CLASS_CREATE_COMPLETE'
EXPORTING
devclass = iv_package
overwrite = iv_overwrite
CHANGING
class = is_properties
EXCEPTIONS
existing ... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL lv_cp
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 360 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS lcl_oo_base IMPLEMENTATION.
METHOD lif_oo_object_fnc~create.
ASSERT 0 = 1. "Subclass responsibility
ENDMETHOD.
METHOD lif_oo_object_fnc~deserialize_source.
TRY.
deserialize_abap_source_new(
is_clskey = is_key
it_source = it_source ).
CATCH cx_sy... | I found vulnerabilities in the line:
```abap
DELETE FROM seocompotx WHERE clsname = is_key-clsname.
```
Explanation: Modify only own DB tables.
```abap
INSERT seocompotx FROM TABLE it_descriptions.
```
Explanation: Modify only own DB tables. | 362 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE sap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 364 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
READ TABLE it_tpool WITH KEY id = 'R' TRANSPORTING NO FIELDS.
IF ( sy-subrc = 0 AND lines( it_tpool ) = 1 ) OR lines( it_tpool... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL iv_program
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 367 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD list_by_type.
SELECT * FROM (c_tabname)
INTO TABLE rt_content
WHERE type = iv_type. "#EC CI_SUBRC
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
METHOD list_by_type.
SELECT * FROM (c_tabname) * <-- There is a problem here
INTO TABLE rt_content
```
Explanation: Potential dangerous statement Dynamic SQL. | 368 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD add.
DATA ls_table TYPE ty_content.
ls_table-type = iv_type.
ls_table-value = iv_value.
ls_table-data_str = iv_data.
INSERT (c_tabname) FROM ls_table. "#EC CI_SUBRC
ASSERT sy-subrc = 0.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
INSERT (c_tabname) FROM ls_table.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 370 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD update.
DATA lv_data LIKE iv_data.
lv_data = validate_and_unprettify_xml( iv_data ).
lock( iv_type = iv_type
iv_value = iv_value ).
UPDATE (c_tabname) SET data_str = lv_data
WHERE type = iv_type
AND value = iv_value.
IF sy-subrc <> 0.
zcx_abapgit_excepti... | I found vulnerabilities in the line:
```abap
UPDATE (c_tabname) SET data_str = lv_data
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 372 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD modify.
DATA: ls_content TYPE ty_content.
lock( iv_type = iv_type
iv_value = iv_value ).
ls_content-type = iv_type.
ls_content-value = iv_value.
ls_content-data_str = iv_data.
MODIFY (c_tabname) FROM ls_content.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( ... | I found vulnerabilities in the line:
```abap
MODIFY (c_tabname) FROM ls_content.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 373 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD read.
SELECT SINGLE data_str FROM (c_tabname) INTO rv_data
WHERE type = iv_type
AND value = iv_value. "#EC CI_SUBRC
IF sy-subrc <> 0.
RAISE EXCEPTION TYPE lcx_not_found.
ENDIF.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
SELECT SINGLE data_str FROM (c_tabname) INTO rv_data
```
Explanation: Potential dangerous statement Dynamic SQL. | 374 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD create_report.
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
ASSERT sy-subrc = 0.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
```
Explanation: Potential dangerous statement INSERT REPORT. | 375 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD update_cs_number_of_methods.
" Indirect access to keep downward compatibility
DATA lr_cache_entry TYPE REF TO data.
FIELD-SYMBOLS: <lg_cache_entry> TYPE any,
<lg_field> TYPE any.
TRY.
CREATE DATA lr_cache_entry TYPE ('SEO_CS_CACHE').
CATCH cx_sy_cre... | I found vulnerabilities in the line:
```abap
MODIFY ('SEO_CS_CACHE') FROM <lg_cache_entry>.
```
Explanation: Modify only own DB tables. | 376 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_oo_class IMPLEMENTATION.
METHOD create_report.
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
ASSERT sy-subrc = 0.
ENDMETHOD.
METHOD determine_method_include.
DATA: ls_mtdkey TYPE seocpdkey.
... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL lv_cp
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 378 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD delete.
lock( iv_type = iv_type
iv_value = iv_value ).
DELETE FROM (c_tabname)
WHERE type = iv_type
AND value = iv_value.
IF sy-subrc <> 0.
lcx_exception=>raise( 'DB Delete failed' ).
ENDIF.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
DELETE FROM (c_tabname)
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 382 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD update.
validate_xml( iv_data ).
lock( iv_type = iv_type
iv_value = iv_value ).
UPDATE (c_tabname) SET data_str = iv_data
WHERE type = iv_type
AND value = iv_value.
IF sy-subrc <> 0.
lcx_exception=>raise( 'DB update failed' ).
ENDIF.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
UPDATE (c_tabname) SET data_str = iv_data
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 383 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD modify.
DATA: ls_content TYPE ty_content.
lock( iv_type = iv_type
iv_value = iv_value ).
ls_content-type = iv_type.
ls_content-value = iv_value.
ls_content-data_str = iv_data.
MODIFY (c_tabname) FROM ls_content.
IF sy-subrc <> 0.
lcx_exception=>raise( 'DB modi... | I found vulnerabilities in the line:
```abap
MODIFY (c_tabname) FROM ls_content.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 384 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 2.
" Drop also any inactive code that is left in REPOSRC
DELETE REPORT lv_program ##SUBRC_OK.
ELSEIF sy-subrc <> 0.
``` | I found vulnerabilities in the line:
```abap
DELETE REPORT lv_program ##SUBRC_OK.
```
Explanation: Potential dangerous statement DELETE REPORT. | 386 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE sap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT. | 388 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
DATA lv_state TYPE c.
DATA lv_delete TYPE abap_bool.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
IF lv_language = mv_language.
lv_state = 'I'. "Textpool in m... | I found vulnerabilities in the line:
```abap
ENDIF.
INSERT TEXTPOOL iv_program * <-- There is a problem here
FROM it_tpool
LANGUAGE lv_language
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 392 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_where INTO lv_where.
SELECT * FROM (iv_name) APPENDING TABLE <lg_tab> WHERE (lv_where).
ENDLOOP.
``` | I found vulnerabilities in the line:
```abap
SELECT * FROM (iv_name) APPENDING TABLE <lg_tab> WHERE (lv_where).
```
Explanation: Potential dangerous statement Dynamic SQL. | 393 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF lines( it_where ) = 0.
SELECT * FROM (iv_name) INTO TABLE <lg_tab>.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
SELECT * FROM (iv_name) INTO TABLE <lg_tab>.
```
Explanation: Potential dangerous statement Dynamic SQL. | 394 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_namespace
group = lv... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 395 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD delete_report.
DELETE REPORT iv_program ##SUBRC_OK.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
DELETE REPORT iv_program ##SUBRC_OK.
```
Explanation: Potential dangerous statement DELETE REPORT. | 397 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_oo_class IMPLEMENTATION.
METHOD create_report.
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
ASSERT sy-subrc = 0.
ENDMETHOD.
METHOD delete_report.
DELETE REPORT iv_program ##SUBRC_OK.
ENDMET... | I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL lv_cp
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 400 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_program.
DATA: lv_exists TYPE abap_bool,
lt_empty_src LIKE it_source,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any>... | I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT.
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous sta... | 402 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF iv_is_include = abap_false OR lv_state = 'A'.
DELETE TEXTPOOL iv_program "Remove initial description from textpool if
LANGUAGE lv_language "original program does not have a textpool
STATE lv_state.
lv_delete = abap_true.
ELSE.
``` | I found vulnerabilities in the line:
```abap
DELETE TEXTPOOL iv_program
```
Explanation: Potential dangerous statement DELETE TEXTPOOL. | 404 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF it_tpool IS INITIAL.
IF iv_is_include = abap_false OR lv_state = 'A'.
DELETE TEXTPOOL iv_program "Remove initial description from textpool if
LANGUAGE lv_language "original program does not have a textpool
STATE lv_state.
lv_delete = abap_true.
ELSE.
INSERT TEXTPOOL i... | I found vulnerabilities in the line:
```abap
ELSE.
INSERT TEXTPOOL iv_program "In case of includes: Deletion of textpool in * <-- There is a problem here
FROM it_tpool
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 405 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_textpool.
DATA lv_language TYPE langu.
DATA lv_state TYPE c.
DATA lv_delete TYPE abap_bool.
IF iv_language IS INITIAL.
lv_language = mv_language.
ELSE.
lv_language = iv_language.
ENDIF.
IF lv_language = mv_language.
lv_state = 'I'. "Textpool in m... | I found vulnerabilities in the line:
```abap
ENDIF.
INSERT TEXTPOOL iv_program * <-- There is a problem here
FROM it_tpool
LANGUAGE lv_language
```
Explanation: Potential dangerous statement INSERT TEXTPOOL. | 406 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS lcl_oo_base IMPLEMENTATION.
METHOD lif_oo_object_fnc~create.
ASSERT 0 = 1. "Subclass responsibility
ENDMETHOD.
METHOD lif_oo_object_fnc~deserialize_source.
TRY.
deserialize_abap_source_new(
is_clskey = is_key
it_source = it_source ).
CATCH cx_sy... | I found vulnerabilities in the line:
```abap
DELETE FROM seocompotx WHERE clsname = is_key-clsname.
```
Explanation: Modify only own DB tables.
```abap
INSERT seocompotx FROM TABLE it_descriptions.
```
Explanation: Modify only own DB tables. | 410 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_type IMPLEMENTATION.
METHOD create.
DATA: lv_progname TYPE reposrc-progname,
lv_typegroup TYPE rsedd0-typegroup.
lv_typegroup = ms_item-obj_name.
CALL FUNCTION 'RS_DD_TYGR_INSERT_SOURCES'
EXPORTING
typegroupname = lv_typeg... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 423 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_namespace
group = lv... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 424 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_where INTO lv_where.
SELECT * FROM (iv_name) INTO TABLE <lg_tab> WHERE (lv_where).
ENDLOOP.
``` | I found vulnerabilities in the line:
```abap
SELECT * FROM (iv_name) INTO TABLE <lg_tab> WHERE (lv_where).
```
Explanation: Potential dangerous statement Dynamic SQL. | 425 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT mt_object_table ASSIGNING <ls_table>.
lv_where = get_where_clause( <ls_table>-tobj_name ).
ASSERT NOT lv_where IS INITIAL.
DELETE FROM (<ls_table>-tobj_name) WHERE (lv_where).
IF <ls_table>-tobj_name = lv_primary.
ASSERT sy-dbcnt <= 1. "Just to be on the very safe side
ENDIF.
EN... | I found vulnerabilities in the line:
```abap
DELETE FROM (<ls_table>-tobj_name) WHERE (lv_where).
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 427 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT mt_object_table ASSIGNING <ls_table>.
CREATE DATA lr_ref TYPE STANDARD TABLE OF (<ls_table>-tobj_name).
ASSIGN lr_ref->* TO <lt_data>.
io_xml->read(
EXPORTING
iv_name = <ls_table>-tobj_name
CHANGING
cg_data = <lt_data> ).
INSERT (<ls_table>-tobj_name) FROM TABLE... | I found vulnerabilities in the line:
```abap
INSERT (<ls_table>-tobj_name) FROM TABLE <lt_data>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 428 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD exists.
DATA: lv_where_clause TYPE string,
lv_primary TYPE objsl-tobj_name,
lr_table_line TYPE REF TO data.
FIELD-SYMBOLS: <lg_table_line> TYPE any.
lv_primary = get_primary_table( ).
lv_where_clause = get_where_clause( lv_primary ).
CREATE DATA lr_tabl... | I found vulnerabilities in the line:
```abap
SELECT SINGLE * FROM (lv_primary) INTO <lg_table_line> WHERE (lv_where_clause).
```
Explanation: Potential dangerous statement Dynamic SQL. | 429 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT mt_object_table ASSIGNING <ls_object_table>.
CREATE DATA lr_ref TYPE STANDARD TABLE OF (<ls_object_table>-tobj_name).
ASSIGN lr_ref->* TO <lt_data>.
lv_where = get_where_clause( <ls_object_table>-tobj_name ).
SELECT * FROM (<ls_object_table>-tobj_name)
INTO TABLE <lt_data>
WH... | I found vulnerabilities in the line:
```abap
SELECT * FROM (<ls_object_table>-tobj_name)
```
Explanation: Potential dangerous statement Dynamic SQL. | 430 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD validate.
DATA: lv_where TYPE string,
lv_primary TYPE objsl-tobj_name,
lr_ref TYPE REF TO data.
FIELD-SYMBOLS: <lt_data> TYPE STANDARD TABLE.
lv_primary = get_primary_table( ).
CREATE DATA lr_ref TYPE STANDARD TABLE OF (lv_primary).
ASSIGN lr_ref->* TO <lt... | I found vulnerabilities in the line:
```abap
SELECT COUNT(*) FROM (lv_primary) WHERE (lv_where).
```
Explanation: Potential dangerous statement Dynamic SQL. | 431 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS ZCL_ABAPGIT_OBJECT_TYPE IMPLEMENTATION.
METHOD create.
DATA: lv_progname TYPE reposrc-progname,
lv_typegroup TYPE rsedd0-typegroup.
lv_typegroup = ms_item-obj_name.
CALL FUNCTION 'RS_DD_TYGR_INSERT_SOURCES'
EXPORTING
typegroupname = lv_typeg... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 434 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_EXISTS'
EXPORTING
funcname = <ls_func>-funcname
IMPORTING
include = lv_include
EXCEPTIO... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT. | 436 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT mt_object_table ASSIGNING <ls_table>.
CREATE DATA lr_ref TYPE STANDARD TABLE OF (<ls_table>-tobj_name).
ASSIGN lr_ref->* TO <lt_data>.
io_xml->read(
EXPORTING
iv_name = <ls_table>-tobj_name
CHANGING
cg_data = <lt_data> ).
INSERT (<ls_table>-tobj_name) FROM TABLE... | I found vulnerabilities in the line:
```abap
INSERT (<ls_table>-tobj_name) FROM TABLE <lt_data>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL. | 453 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD validate.
DATA: lv_where TYPE string,
lv_primary TYPE objsl-tobj_name,
lr_ref TYPE REF TO data.
FIELD-SYMBOLS: <lt_data> TYPE STANDARD TABLE.
lv_primary = get_primary_table( ).
CREATE DATA lr_ref TYPE STANDARD TABLE OF (lv_primary).
ASSIGN lr_ref->* TO <lt... | I found vulnerabilities in the line:
```abap
SELECT COUNT(*) FROM (lv_primary) WHERE (lv_where).
```
Explanation: Potential dangerous statement Dynamic SQL. | 456 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF lv_subrc = 0.
* it cannot delete table with table without asking
CREATE DATA lr_data TYPE (lv_objname).
ASSIGN lr_data->* TO <lg_data>.
SELECT SINGLE * FROM (lv_objname) INTO <lg_data>.
IF sy-subrc = 0.
lv_no_ask = abap_false.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
SELECT SINGLE * FROM (lv_objname) INTO <lg_data>.
```
Explanation: Potential dangerous statement Dynamic SQL. | 458 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_type IMPLEMENTATION.
METHOD zif_abapgit_object~has_changed_since.
rv_changed = abap_true.
ENDMETHOD.
METHOD zif_abapgit_object~changed_by.
rv_user = c_user_unknown. " todo
ENDMETHOD.
METHOD zif_abapgit_object~get_metadata.
rs_metadata = get_metadata( ... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 459 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS ZCL_ABAPGIT_OBJECT_TYPE IMPLEMENTATION.
METHOD create.
DATA: lv_progname TYPE reposrc-progname,
lv_typegroup TYPE rsedd0-typegroup.
lv_typegroup = ms_item-obj_name.
CALL FUNCTION 'RS_DD_TYGR_INSERT_SOURCES'
EXPORTING
typegroupname = lv_typeg... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 462 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_sicf IMPLEMENTATION.
METHOD change_sicf.
DATA: lt_icfhndlist TYPE icfhndlist,
lt_existing TYPE TABLE OF icfhandler,
ls_icfserdesc TYPE icfserdesc.
FIELD-SYMBOLS: <ls_existing> LIKE LINE OF lt_existing.
lt_icfhndlist = to_icfhndlist( ... | I found vulnerabilities in the line:
```abap
DELETE FROM icfapplcust
```
Explanation: Modify only own DB tables. | 470 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT is_properties-attributes ASSIGNING <ls_attribute>.
lo_attribute-clsname = iv_clif_name.
lo_attribute-cmpname = <ls_attribute>-name.
lo_attribute-langu = iv_language.
lo_attribute-descript = <ls_attribute>-description.
MODIFY seocompotx FROM lo_attribute.
ENDLOOP.
``` | I found vulnerabilities in the line:
```abap
MODIFY seocompotx FROM lo_attribute.
```
Explanation: Modify only own DB tables. | 471 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT is_properties-methods ASSIGNING <ls_method>.
lo_method-clsname = iv_clif_name.
lo_method-cmpname = <ls_method>-name.
lo_method-langu = iv_language.
lo_method-descript = <ls_method>-description.
MODIFY seocompotx FROM lo_method.
LOOP AT <ls_method>-parameters ASSIGNING <ls_parame... | I found vulnerabilities in the line:
```abap
MODIFY seocompotx FROM lo_method.
```
Explanation: Modify only own DB tables. | 472 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT <ls_method>-parameters ASSIGNING <ls_parameter>.
lo_method_parameter-clsname = iv_clif_name.
lo_method_parameter-cmpname = <ls_method>-name.
lo_method_parameter-sconame = <ls_parameter>-name.
lo_method_parameter-langu = iv_language.
lo_method_parameter-descript = <ls_parameter>-desc... | I found vulnerabilities in the line:
```abap
MODIFY seosubcotx FROM lo_method_parameter.
```
Explanation: Modify only own DB tables. | 473 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT <ls_method>-exceptions ASSIGNING <ls_exception>.
lo_method_exception-clsname = iv_clif_name.
lo_method_exception-cmpname = <ls_method>-name.
lo_method_exception-sconame = <ls_exception>-name.
lo_method_exception-langu = iv_language.
lo_method_exception-descript = <ls_exception>-desc... | I found vulnerabilities in the line:
```abap
MODIFY seosubcotx FROM lo_method_exception.
```
Explanation: Modify only own DB tables. | 474 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT is_properties-events ASSIGNING <ls_event>.
lo_event-clsname = iv_clif_name.
lo_event-cmpname = <ls_event>-name.
lo_event-langu = iv_language.
lo_event-descript = <ls_event>-description.
MODIFY seocompotx FROM lo_event.
LOOP AT <ls_event>-parameters ASSIGNING <ls_parameter>.
... | I found vulnerabilities in the line:
```abap
MODIFY seocompotx FROM lo_event.
```
Explanation: Modify only own DB tables. | 475 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT <ls_event>-parameters ASSIGNING <ls_parameter>.
lo_event_parameter-clsname = iv_clif_name.
lo_event_parameter-cmpname = <ls_event>-name.
lo_event_parameter-sconame = <ls_parameter>-name.
lo_event_parameter-langu = iv_language.
lo_event_parameter-descript = <ls_parameter>-description... | I found vulnerabilities in the line:
```abap
MODIFY seosubcotx FROM lo_event_parameter.
```
Explanation: Modify only own DB tables. | 476 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT is_properties-types ASSIGNING <ls_type>.
lo_type-clsname = iv_clif_name.
lo_type-cmpname = <ls_type>-name.
lo_type-langu = iv_language.
lo_type-descript = <ls_type>-description.
MODIFY seocompotx FROM lo_type.
ENDLOOP.
``` | I found vulnerabilities in the line:
```abap
MODIFY seocompotx FROM lo_type.
```
Explanation: Modify only own DB tables. | 477 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF lv_subrc = 0.
* it cannot delete table with table wihtout asking
CREATE DATA lr_data TYPE (lv_objname).
ASSIGN lr_data->* TO <lg_data>.
SELECT SINGLE * FROM (lv_objname) INTO <lg_data>.
IF sy-subrc = 0.
lv_no_ask = abap_false.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
SELECT SINGLE * FROM (lv_objname) INTO <lg_data>.
```
Explanation: Potential dangerous statement Dynamic SQL. | 478 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS ZCL_ABAPGIT_OBJECT_DOCT IMPLEMENTATION.
METHOD constructor.
super->constructor(
is_item = is_item
iv_language = iv_language ).
mi_longtexts = zcl_abapgit_factory=>get_longtexts( ).
ENDMETHOD.
METHOD zif_abapgit_object~changed_by.
rv_user = mi_l... | I found vulnerabilities in the line:
```abap
MODIFY dokentry FROM ls_dokentry.
```
Explanation: Modify only own DB tables. | 479 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD delete_msgid.
delete_documentation( iv_message_id ).
DELETE FROM t100a WHERE arbgb = iv_message_id.
IF sy-subrc = 0 OR sy-subrc = 4.
CALL FUNCTION 'RS_TREE_OBJECT_PLACEMENT'
EXPORTING
object = iv_message_id
operation = 'DELETE'
program = space
... | I found vulnerabilities in the line:
```abap
DELETE FROM t100a WHERE arbgb = iv_message_id.
```
Explanation: Modify only own DB tables. | 481 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF sy-subrc = 0 OR sy-subrc = 4.
CALL FUNCTION 'RS_TREE_OBJECT_PLACEMENT'
EXPORTING
object = iv_message_id
operation = 'DELETE'
program = space
type = 'CN'.
DELETE FROM t100o WHERE arbgb = iv_message_id.
DELETE FROM t100t WHERE arbgb = iv_message_id. "#EC C... | I found vulnerabilities in the line:
```abap
DELETE FROM t100o WHERE arbgb = iv_message_id.
```
Explanation: Modify only own DB tables.
```abap
DELETE FROM t100t WHERE arbgb = iv_message_id.
```
Explanation: Modify only own DB tables.
```abap
DELETE FROM t100u WHERE arbgb = iv_message_id.
```
Explanation: Modify only o... | 482 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD deserialize_texts.
DATA: lv_msg_id TYPE rglif-message_id,
ls_t100 TYPE t100,
lt_t100t TYPE TABLE OF t100t,
lt_t100_texts TYPE ty_t100_texts,
lt_t100u TYPE TABLE OF t100u.
FIELD-SYMBOLS: <ls_t100_text> TYPE ty_t100_text.
lv_msg_id = ... | I found vulnerabilities in the line:
```abap
MODIFY t100t FROM TABLE lt_t100t.
```
Explanation: Modify only own DB tables. | 483 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT lt_t100_texts ASSIGNING <ls_t100_text>.
"check if message exists
READ TABLE lt_t100u TRANSPORTING NO FIELDS
WITH KEY arbgb = lv_msg_id msgnr = <ls_t100_text>-msgnr BINARY SEARCH.
CHECK sy-subrc = 0. "if original message doesn't exist no translations added
MOVE-CORRESPONDING <ls_t100_t... | I found vulnerabilities in the line:
```abap
MODIFY t100 FROM ls_t100.
```
Explanation: Modify only own DB tables. | 484 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT lt_t100 ASSIGNING <ls_t100>.
DELETE lt_before WHERE msgnr = <ls_t100>-msgnr.
MODIFY t100 FROM <ls_t100>.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'MSAG: Table T100 modify failed' ).
ENDIF.
CLEAR ls_t100u.
MOVE-CORRESPONDING <ls_t100> TO ls_t100u ##enh_ok.
ls_t100u-name ... | I found vulnerabilities in the line:
```abap
MODIFY t100 FROM <ls_t100>.
```
Explanation: Modify only own DB tables.
```abap
MODIFY t100u FROM ls_t100u.
```
Explanation: Modify only own DB tables. | 485 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_msag IMPLEMENTATION.
METHOD delete_documentation.
DATA: lv_key_s TYPE dokhl-object.
CLEAR lv_key_s.
CALL FUNCTION 'DOCU_OBJECT_NAME_CONCATENATE'
EXPORTING
docu_id = 'NA'
element = iv_message_id
addition = ' '
IMPORTING... | I found vulnerabilities in the line:
```abap
MODIFY t100a FROM ls_t100a.
```
Explanation: Modify only own DB tables.
```abap
MODIFY t100t FROM ls_t100t.
```
Explanation: Modify only own DB tables. | 486 |
Find vulnerabilities in this ABAP code snippet. | ```abap
LOOP AT lt_before INTO ls_t100u.
DELETE FROM t100 WHERE arbgb = ls_t100u-arbgb
AND msgnr = ls_t100u-msgnr. "#EC CI_SUBRC
DELETE FROM t100u WHERE arbgb = ls_t100u-arbgb
AND msgnr = ls_t100u-msgnr. "#EC CI_SUBRC
ENDLOOP.
``` | I found vulnerabilities in the line:
```abap
DELETE FROM t100 WHERE arbgb = ls_t100u-arbgb
```
Explanation: Modify only own DB tables.
```abap
DELETE FROM t100u WHERE arbgb = ls_t100u-arbgb
```
Explanation: Modify only own DB tables. | 487 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD delete_extras.
DELETE FROM tddat WHERE tabname = iv_tabname.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
DELETE FROM tddat WHERE tabname = iv_tabname.
```
Explanation: Modify only own DB tables. | 489 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD update_extras.
IF is_tabl_extras-tddat IS INITIAL.
delete_extras( iv_tabname ).
ELSE.
MODIFY tddat FROM is_tabl_extras-tddat.
ENDIF.
ENDMETHOD.
``` | I found vulnerabilities in the line:
```abap
MODIFY tddat FROM is_tabl_extras-tddat.
```
Explanation: Modify only own DB tables. | 490 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF lines( lt_tpool_i18n ) > 0.
MODIFY tstct FROM TABLE lt_tpool_i18n.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'Update of t-code translations failed' ).
ENDIF.
``` | I found vulnerabilities in the line:
```abap
MODIFY tstct FROM TABLE lt_tpool_i18n.
```
Explanation: Modify only own DB tables. | 491 |
Find vulnerabilities in this ABAP code snippet. | ```abap
METHOD save_authorizations.
CONSTANTS: lc_hex_chk TYPE x VALUE '04'.
DATA: ls_transaction TYPE tstc.
transaction_read( EXPORTING iv_transaction = iv_transaction
IMPORTING es_transaction = ls_transaction ).
DELETE FROM tstca WHERE tcode = iv_transaction.
IF ls_transact... | I found vulnerabilities in the line:
```abap
DELETE FROM tstca WHERE tcode = iv_transaction.
```
Explanation: Modify only own DB tables. | 492 |
Find vulnerabilities in this ABAP code snippet. | ```abap
IF ls_transaction IS NOT INITIAL.
INSERT tstca FROM TABLE it_authorizations.
ls_transaction-cinfo = ls_transaction-cinfo + lc_hex_chk.
UPDATE tstc SET cinfo = ls_transaction-cinfo WHERE tcode = ls_transaction-tcode.
ENDIF.
``` | I found vulnerabilities in the line:
```abap
INSERT tstca FROM TABLE it_authorizations.
```
Explanation: Modify only own DB tables.
```abap
UPDATE tstc SET cinfo = ls_transaction-cinfo WHERE tcode = ls_transaction-tcode.
```
Explanation: Modify only own DB tables. | 493 |
Find vulnerabilities in this ABAP code snippet. | ```abap
CLASS zcl_abapgit_object_type IMPLEMENTATION.
METHOD zif_abapgit_object~changed_by.
rv_user = c_user_unknown. " todo
ENDMETHOD.
METHOD zif_abapgit_object~get_metadata.
rs_metadata = get_metadata( ).
ENDMETHOD.
METHOD zif_abapgit_object~exists.
TRY.
read( ).
... | I found vulnerabilities in the line:
```abap
INSERT REPORT lv_progname FROM lt_source STATE 'I'.
```
Explanation: Potential dangerous statement INSERT REPORT. | 496 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.