Skip to content

Update InfoTable.java #3

Update InfoTable.java

Update InfoTable.java #3

Triggered via push June 14, 2024 11:37
Status Success
Total duration 3m 11s
Artifacts
Fit to window
Zoom out
Zoom in

Annotations

66 warnings and 9 notices
Constant values: src/knife/FindUrlAndRequest.java#L24
Condition `url.startsWith("./")` is always `true`
Nullability and data flow problems: src/messageTab/Info/InfoEntry.java#L23
Variable is already assigned to this value
Nullability and data flow problems: src/burp/RobotInput.java#L232
Method invocation `waitFor` may produce `NullPointerException`
Statement with empty body: src/burp/BurpExtender.java#L250
`if` statement has empty body
Statement with empty body: src/messageTab/Info/InfoTableModel.java#L97
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L74
`if` statement has empty body
Statement with empty body: src/knife/OpenWithBrowserMenu.java#L55
`if` statement has empty body
Statement with empty body: src/config/ConfigTableModel.java#L296
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L166
`if` statement has empty body
Statement with empty body: src/config/GUI.java#L403
`else` statement has empty body
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L189
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L552
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L160
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L557
Result of `File.createNewFile()` is ignored
Call to 'toString()' on array: src/Deprecated/JSONBeautifier.java#L95
Call to 'toString()' on array
Inner class may be 'static': src/config/GUI.java#L573
Inner class `JsonFileFilter` may be 'static'
Magic constant: src/burp/Methods.java#L56
Should be one of: JOptionPane.INFORMATION_MESSAGE, JOptionPane.WARNING_MESSAGE, JOptionPane.ERROR_MESSAGE, ...
String concatenation in loop: src/burp/Methods.java#L179
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L154
String concatenation `+=` in loop
String concatenation in loop: src/Deprecated/MessageEditor.java#L256
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L156
String concatenation `+=` in loop
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L120
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L123
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L150
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L147
String concatenation as argument to `StringBuilder.append()` call
Suspicious date format pattern: src/Deprecated/DownloadResponseMenu2.java#L202
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious date format pattern: src/knife/DownloadResponseMenu.java#L201
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious 'System.arraycopy()' call: src/base/FindUrlAction.java#L308
Source parameter type 'java.lang.Object\[\]' is not assignable to destination parameter `possibleValues` of type 'java.lang.String\[\]'
Synchronization on a non-final field: src/config/ConfigTableModel.java#L316
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L138
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L114
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L371
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L341
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L127
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L153
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L330
Synchronization on a non-final field `configEntries`
Unused assignment: src/knife/OpenWithBrowserMenu.java#L171
Variable `source` initializer `null` is redundant
Unused assignment: src/config/ProcessManager.java#L132
Variable `url1` initializer `""` is redundant
Unused assignment: src/knife/OpenWithBrowserMenu.java#L124
Variable `source` initializer `null` is redundant
Vulnerable API usage: src/base/RequestTask.java#L67
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L33
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L47
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L59
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L40
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L66
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L50
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L61
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L55
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L28
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L43
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L25
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L49
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L31
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L45
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L35
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L58
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L63
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L154
Dependency maven:org.beanshell:bsh:2.0b5 is vulnerable * [CVE-2016-2510](https://devhub.checkmarx.com/cve-details/CVE-2016-2510?utm_source=jetbrains&utm_medium=referral) 8.1 Data Processing Errors vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L161
Provides transitive vulnerable dependency maven:commons-collections:commons-collections:3.2.2 * [Cx78f40514-81ff](https://devhub.checkmarx.com/cve-details/Cx78f40514-81ff?utm_source=jetbrains&utm_medium=referral) 7.5 Uncontrolled Recursion vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
qodana
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
Constant values: src/config/ConfigEntry.java#L392
Value `messageIsRequest` is always 'false'
Constant values: src/burp/BurpExtender.java#L259
Value `messageIsRequest` is always 'true'
Constant values: src/base/FindUrlAction.java#L325
Value `selectedValue` is always 'null'
Constant values: src/burp/BurpExtender.java#L238
Value `messageIsRequest` is always 'true'
Constant values: src/messageTab/Info/InfoTab.java#L72
Value `isRequest` is always 'false'
Constant values: src/burp/BurpExtender.java#L263
Value `messageIsRequest` is always 'true'
'if' statement with identical branches: src/test/render.java#L16
'if' statement can be collapsed
Vulnerable declared dependency: pom.xml#L72
Dependency maven:com.github.kevinsawicki:http-request:6.0 is vulnerable * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L86
Provides transitive vulnerable dependency maven:com.github.seancfoley:ipaddress:5.3.3 * [CVE-2023-50570](https://devhub.checkmarx.com/cve-details/CVE-2023-50570?utm_source=jetbrains&utm_medium=referral) 5.5 Loop with Unreachable Exit Condition ("Infinite Loop") vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)