Project Name | Ohloh UI |
---|---|
Lines of code analyzed | 1,002,973 |
On Coverity Scan since | Nov 13, 2017 |
Last build analyzed | 18 days ago |
Language | PHP/Python/Ruby |
Secondary Language | JavaScript |
Repository URL | https://github.com/blackducksoftware/ohloh-ui |
Homepage URL | https://www.openhub.net |
License | Apache (Apache License ) |
Want to view defects or help fix defects?
Add me to projectVersion: 620edc6183ae4ac5fdced0f21d657a...
Note: Defect density is measured by the number of defects per 1,000 lines of code.
Component Name | Pattern | Ignore | Line of Code | Defect density |
---|---|---|---|---|
Script | /script/.* | Yes | 2,125 | N/A |
cov-analysis | /cov-analysis/.* | Yes | 890,289 | N/A |
docker | /docker-* | Yes | 31 | N/A |
public | /public/.* | Yes | 5,602 | N/A |
Other | .* | No | 104,976 | 0.70 |
ID | CWE-Name | Number of Defects |
---|---|---|
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | 3 |
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 4 |
79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 7 |
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 12 |
352 | Cross-Site Request Forgery (CSRF) | 1 |
676 | Use of Potentially Dangerous Function | 5 |
798 | Use of Hard-coded Credentials | 37 |
829 | Inclusion of Functionality from Untrusted Control Sphere | 2 |
862 | Missing Authorization | 11 |
Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.
Would you like to view the project defects, or help improve its quality by fixing defects?
Add me to project