SpotBugs Bug Detector Report
The following document contains the results of SpotBugs
SpotBugs Version is 4.8.0
Threshold is medium
Effort is default
Summary
Classes | Bugs | Errors | Missing Classes |
---|---|---|---|
17 | 13 | 0 | 0 |
Files
Class | Bugs |
---|---|
org.apache.commons.chain.web.javax.servlet.ServletWebContext | 13 |
org.apache.commons.chain.web.javax.servlet.ServletWebContext
Bug | Category | Details | Line | Priority |
---|---|---|---|---|
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getApplicationScope() may expose internal representation by returning ServletWebContext.applicationScope | MALICIOUS_CODE | EI_EXPOSE_REP | 217 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getContext() may expose internal representation by returning ServletWebContext.context | MALICIOUS_CODE | EI_EXPOSE_REP | 140 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getCookies() may expose internal representation by returning ServletWebContext.cookieValues | MALICIOUS_CODE | EI_EXPOSE_REP | 296 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getHeader() may expose internal representation by returning ServletWebContext.header | MALICIOUS_CODE | EI_EXPOSE_REP | 230 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getHeaderValues() may expose internal representation by returning ServletWebContext.headerValues | MALICIOUS_CODE | EI_EXPOSE_REP | 243 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getInitParam() may expose internal representation by returning ServletWebContext.initParam | MALICIOUS_CODE | EI_EXPOSE_REP | 256 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getParam() may expose internal representation by returning ServletWebContext.param | MALICIOUS_CODE | EI_EXPOSE_REP | 269 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getParamValues() may expose internal representation by returning ServletWebContext.paramValues | MALICIOUS_CODE | EI_EXPOSE_REP | 282 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getRequestScope() may expose internal representation by returning ServletWebContext.requestScope | MALICIOUS_CODE | EI_EXPOSE_REP | 309 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getResponse() may expose internal representation by returning ServletWebContext.response | MALICIOUS_CODE | EI_EXPOSE_REP | 158 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.getSessionScope() may expose internal representation by returning ServletWebContext.sessionScope | MALICIOUS_CODE | EI_EXPOSE_REP | 322 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.initialize(ServletContext, HttpServletRequest, HttpServletResponse) may expose internal representation by storing an externally mutable object into ServletWebContext.context | MALICIOUS_CODE | EI_EXPOSE_REP2 | 174 | Medium |
org.apache.commons.chain.web.javax.servlet.ServletWebContext.initialize(ServletContext, HttpServletRequest, HttpServletResponse) may expose internal representation by storing an externally mutable object into ServletWebContext.response | MALICIOUS_CODE | EI_EXPOSE_REP2 | 176 | Medium |