Project Name | Blessingogoinja/JavaVulnerableLab |
---|---|
Lines of code analyzed | 861 |
On Coverity Scan since | Jun 29, 2023 |
Last build analyzed | a while ago |
Language | Java |
Repository URL | https://github.com/Blessingogoinja/JavaVulnerableLab.git |
Homepage URL | https://github.com/Blessingogoinja/JavaVulnerableLab |
License | GPL (GNU General Public License version ) |
Want to view defects or help fix defects?
Add me to projectAlong with Coverity defects found by Coverity analysis, you may include or exclude Findbugs defects in analysis results.
You may disable or enable Findbugs defects via the Edit function in project settings. Changes will be reflected upon subsequent build submissions.
Excluding or including these defects will change the total number of defects significantly.
Note: Defect density is measured by the number of defects per 1,000 lines of code.
ID | CWE-Name | Number of Defects |
---|---|---|
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | 1 |
79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 4 |
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 7 |
327 | Use of a Broken or Risky Cryptographic Algorithm | 1 |
352 | Cross-Site Request Forgery (CSRF) | 6 |
Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.
Would you like to view the project defects, or help improve its quality by fixing defects?
Add me to project