Fork me on GitHub

SpotBugs Bug Detector Report

The following document contains the results of SpotBugs

SpotBugs Version is 4.7.3

Threshold is medium

Effort is default

Summary

Classes Bugs Errors Missing Classes
306 16 0 0

Files

Class Bugs
org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer 1
org.owasp.dependencycheck.analyzer.CentralAnalyzer 1
org.owasp.dependencycheck.analyzer.DependencyBundlingAnalyzer 2
org.owasp.dependencycheck.analyzer.GolangModAnalyzer 1
org.owasp.dependencycheck.analyzer.HintAnalyzer 1
org.owasp.dependencycheck.data.knownexploited.json.Vulnerability 8
org.owasp.dependencycheck.data.update.NvdApiDataSource 1
org.owasp.dependencycheck.dependency.Vulnerability 1

org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer

Bug Category Details Line Priority
Possible null pointer dereference in org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer.loadSuppressionFile(SuppressionParser, String) due to return value of called method STYLE NP_NULL_ON_SOME_PATH_FROM_RETURN_VALUE 380 Medium

org.owasp.dependencycheck.analyzer.CentralAnalyzer

Bug Category Details Line Priority
Static field "numberOfRetries" is modified by an instance level synchronized method. MT_CORRECTNESS SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA 119 Medium

org.owasp.dependencycheck.analyzer.DependencyBundlingAnalyzer

Bug Category Details Line Priority
Do not catch NullPointerException like in org.owasp.dependencycheck.analyzer.DependencyBundlingAnalyzer.npmVersionsMatch(String, String) STYLE DCN_NULLPOINTER_EXCEPTION 655 Medium

org.owasp.dependencycheck.analyzer.GolangModAnalyzer

Bug Category Details Line Priority
Static field "goPath" is modified by an instance level synchronization lock. MT_CORRECTNESS SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA 135 Medium

org.owasp.dependencycheck.analyzer.HintAnalyzer

Bug Category Details Line Priority
Possible null pointer dereference in org.owasp.dependencycheck.analyzer.HintAnalyzer.loadHintRules() due to return value of called method STYLE NP_NULL_ON_SOME_PATH_FROM_RETURN_VALUE 296 Medium

org.owasp.dependencycheck.data.knownexploited.json.Vulnerability

Bug Category Details Line Priority
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium
Comparison of String objects using == or != in org.owasp.dependencycheck.data.knownexploited.json.Vulnerability.equals(Object) BAD_PRACTICE ES_COMPARING_STRINGS_WITH_EQ 369 Medium

org.owasp.dependencycheck.data.update.NvdApiDataSource

Bug Category Details Line Priority
Exception is caught when Exception is not thrown in org.owasp.dependencycheck.data.update.NvdApiDataSource.processApi() STYLE REC_CATCH_EXCEPTION 375 Medium

org.owasp.dependencycheck.dependency.Vulnerability

Bug Category Details Line Priority
Class org.owasp.dependencycheck.dependency.Vulnerability defines non-transient non-serializable instance field knownExploitedVulnerability BAD_PRACTICE SE_BAD_FIELD Not available High