MIME type作为路径黑名单 #70
Annotations
67 warnings and 7 notices
Catch block may ignore exception:
src/Deprecated/InsertXSSMenu.java#L122
Empty `catch` block
|
Catch block may ignore exception:
src/messageTab/U2C/ChinesePanel.java#L427
Empty `catch` block
|
Catch block may ignore exception:
src/Deprecated/U2CTabFactory.java#L131
Empty `catch` block
|
Catch block may ignore exception:
src/test/RobotInActionListener.java#L46
Empty `catch` block
|
Catch block may ignore exception:
src/test/RobotInActionListener.java#L72
Empty `catch` block
|
|
Constant values:
src/knife/FindUrlAndRequest.java#L24
Condition `url.startsWith("./")` is always `true`
|
Nullability and data flow problems:
src/messageTab/Info/InfoEntry.java#L23
Variable is already assigned to this value
|
Nullability and data flow problems:
src/burp/RobotInput.java#L232
Method invocation `waitFor` may produce `NullPointerException`
|
Statement with empty body:
src/base/FindUrlAction.java#L98
`if` statement has empty body
|
Statement with empty body:
src/burp/BurpExtender.java#L250
`if` statement has empty body
|
Statement with empty body:
src/knife/OpenWithBrowserMenu.java#L55
`if` statement has empty body
|
Statement with empty body:
src/config/ConfigTableModel.java#L296
`if` statement has empty body
|
Statement with empty body:
src/messageTab/Info/InfoTableModel.java#L92
`if` statement has empty body
|
Statement with empty body:
src/base/FindUrlAction.java#L189
`if` statement has empty body
|
Statement with empty body:
src/config/GUI.java#L403
`else` statement has empty body
|
Result of method call ignored:
src/Deprecated/RunSQLMapMenu.java#L189
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/config/GUI.java#L552
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/Deprecated/RunSQLMapMenu.java#L160
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/config/GUI.java#L557
Result of `File.createNewFile()` is ignored
|
Call to 'toString()' on array:
src/Deprecated/JSONBeautifier.java#L95
Call to 'toString()' on array
|
Inner class may be 'static':
src/config/GUI.java#L573
Inner class `JsonFileFilter` may be 'static'
|
Magic constant:
src/burp/Methods.java#L56
Should be one of: JOptionPane.INFORMATION_MESSAGE, JOptionPane.WARNING_MESSAGE, JOptionPane.ERROR_MESSAGE, ...
|
String concatenation in loop:
src/burp/Methods.java#L179
String concatenation `+=` in loop
|
String concatenation in loop:
src/burp/Methods.java#L154
String concatenation `+=` in loop
|
String concatenation in loop:
src/Deprecated/MessageEditor.java#L256
String concatenation `+=` in loop
|
String concatenation in loop:
src/burp/Methods.java#L156
String concatenation `+=` in loop
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L120
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L123
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L150
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L147
String concatenation as argument to `StringBuilder.append()` call
|
Suspicious date format pattern:
src/Deprecated/DownloadResponseMenu2.java#L202
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
|
Suspicious date format pattern:
src/knife/DownloadResponseMenu.java#L201
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
|
Suspicious 'System.arraycopy()' call:
src/base/FindUrlAction.java#L331
Source parameter type 'java.lang.Object\[\]' is not assignable to destination parameter `possibleValues` of type 'java.lang.String\[\]'
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L316
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L147
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L122
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L371
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L153
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L341
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L109
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L133
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L330
Synchronization on a non-final field `configEntries`
|
Unused assignment:
src/knife/OpenWithBrowserMenu.java#L171
Variable `source` initializer `null` is redundant
|
Unused assignment:
src/config/ProcessManager.java#L132
Variable `url1` initializer `""` is redundant
|
Unused assignment:
src/knife/OpenWithBrowserMenu.java#L124
Variable `source` initializer `null` is redundant
|
Vulnerable API usage:
src/base/RequestTask.java#L67
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L33
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L47
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L59
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L40
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L66
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L50
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L61
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L55
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L28
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L43
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L25
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L49
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L31
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L45
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L35
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L58
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L63
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/upload-artifact@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
|
build
The following actions uses Node.js version which is deprecated and will be forced to run on node20: actions/checkout@v3, actions/setup-java@v3, actions/upload-artifact@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "jar-with-dependencies".
Please update your workflow to use v4 of the artifact actions.
Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
Constant values:
src/base/FindUrlAction.java#L348
Value `selectedValue` is always 'null'
|
Constant values:
src/config/ConfigEntry.java#L392
Value `messageIsRequest` is always 'false'
|
Constant values:
src/messageTab/Info/InfoTab.java#L72
Value `isRequest` is always 'false'
|
Constant values:
src/burp/BurpExtender.java#L259
Value `messageIsRequest` is always 'true'
|
Constant values:
src/burp/BurpExtender.java#L238
Value `messageIsRequest` is always 'true'
|
Constant values:
src/burp/BurpExtender.java#L263
Value `messageIsRequest` is always 'true'
|
'if' statement with identical branches:
src/test/render.java#L16
'if' statement can be collapsed
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
jar-with-dependencies
Expired
|
22.4 MB |
|