1.
|
Command Injection |
|
Resolved |
Unassigned
|
2.
|
Privacy VIolation - Heap Inspection |
|
Open |
Unassigned
|
3.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
4.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
5.
|
Double check locking pattern |
|
Open |
Unassigned
|
6.
|
Privacy VIolation - Heap Inspection |
|
Open |
Unassigned
|
7.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
8.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
9.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
10.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
11.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
12.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
13.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
14.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
15.
|
Use of getByName() to retrieve IP address |
|
Open |
Unassigned
|
16.
|
Password Management: Hardcoded Password |
|
Open |
Unassigned
|
17.
|
Unreleased Resource: Sockets |
|
Resolved |
Arunkumar M
|
18.
|
Unreleased Resource: Sockets |
|
Resolved |
Arunkumar M
|
19.
|
Unreleased Resource: Sockets |
|
Resolved |
Arunkumar M
|
20.
|
Weak SecurityManager Check: Overridable Method |
|
Open |
Unassigned
|
21.
|
Use of getAllByName() to retrieve IP addresses |
|
Open |
Unassigned
|
22.
|
Access Specifier Manipulation |
|
Open |
Unassigned
|
23.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
24.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
25.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
26.
|
Path Manipulation |
|
Open |
Unassigned
|
27.
|
Use of Dynamic Class Loading, Use of Externally-Controlled Input to Select Classes or Code |
|
Open |
Unassigned
|
28.
|
Use of getByAddress() to retrieve InetAddress object |
|
Open |
Unassigned
|
29.
|
Privacy Violation - Heap Inspection |
|
Open |
Unassigned
|
30.
|
Null Dereference |
|
Resolved |
Unassigned
|
31.
|
Password Management: Hardcoded Password |
|
Open |
Unassigned
|
32.
|
Portability Flaw: Locale Dependent Comparison |
|
Resolved |
Unassigned
|
33.
|
Portability Flaw: Locale Dependent Comparison |
|
Resolved |
Unassigned
|
34.
|
Portability Flaw: Locale Dependent Comparison |
|
Resolved |
Unassigned
|
35.
|
Portability Flaw: Locale Dependent Comparison |
|
Resolved |
David Brosius
|
36.
|
Portability Flaw: Locale Dependent Comparison |
|
Resolved |
Unassigned
|
37.
|
Privacy Violation |
|
Open |
Unassigned
|
38.
|
Privacy Violation |
|
Open |
Unassigned
|
39.
|
Improper Neutralization of Special Elements used in a Command ('Command Injection'), Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Open |
Unassigned
|
40.
|
Unreleased Resource: Streams |
|
Open |
Unassigned
|
41.
|
Null Dereference |
|
Resolved |
David Brosius
|
42.
|
Cleanup uses of AlterTableStatementColumn |
|
Resolved |
Sylvain Lebresne
|
43.
|
Null Dereference |
|
Resolved |
Unassigned
|
44.
|
Null Dereference |
|
Resolved |
Unassigned
|