SpotBugs Bug Detector Report

The following document contains the results of SpotBugs

SpotBugs Version is 4.8.3

Threshold is medium

Effort is default

Summary

Classes Bugs Errors Missing Classes
5 8 0 0

Files

Class Bugs
de.funfried.maven.plugin.zonky.StartEmbeddedPostgresMojo 6
de.funfried.maven.plugin.zonky.utils.ZonkyUtil 1
de.funfried.maven.plugins.zonky_maven_plugin.HelpMojo 1

de.funfried.maven.plugin.zonky.StartEmbeddedPostgresMojo

Bug Category Details Line Priority
Hard coded password found SECURITY HARD_CODE_PASSWORD 154 Medium
Hard coded password found SECURITY HARD_CODE_PASSWORD 163 Medium
This use of java/sql/Statement.execute(Ljava/lang/String;)Z can be vulnerable to SQL injection (with JDBC) SECURITY SQL_INJECTION_JDBC 101 Medium
This use of java/sql/Statement.execute(Ljava/lang/String;)Z can be vulnerable to SQL injection (with JDBC) SECURITY SQL_INJECTION_JDBC 104 Medium
This use of java/sql/Statement.execute(Ljava/lang/String;)Z can be vulnerable to SQL injection (with JDBC) SECURITY SQL_INJECTION_JDBC 128 Medium
This use of java/sql/Statement.execute(Ljava/lang/String;)Z can be vulnerable to SQL injection (with JDBC) SECURITY SQL_INJECTION_JDBC 129 Medium

de.funfried.maven.plugin.zonky.utils.ZonkyUtil

Bug Category Details Line Priority
This API (java/io/File.<init>(Ljava/lang/String;)V) reads a file whose location might be specified by user input SECURITY PATH_TRAVERSAL_IN 17 Medium

de.funfried.maven.plugins.zonky_maven_plugin.HelpMojo

Bug Category Details Line Priority
The use of DocumentBuilder.parse(...) (DocumentBuilder) is vulnerable to XML External Entity attacks SECURITY XXE_DOCUMENT 77 Medium