3
I Use This!
Moderate Activity
Analyzed 1 day ago. based on code collected 1 day ago.

Project Summary

DOMjudge is an automated judge system to run programming contests like the ACM ICPC. It provides a mechanism to submit problem solutions (via command-line and the web) and (web)interfaces for teams, the jury and the general public.

Tags

contest icpc judge judging_system programming programming_contest

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    you can embed statistics from Open Hub on your site
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    compare projects before you chose one to use
About Project Security

Languages

HTML
28%
JavaScript
33%
PHP
20%
25 Other
19%

30 Day Summary

May 18 2025 — Jun 17 2025

12 Month Summary

Jun 17 2024 — Jun 17 2025
  • 372 Commits
    Down -202 (35%) from previous 12 months
  • 15 Contributors
    Down -13 (46%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for DOMjudge )

Repository URL: https://github.com/DOMjudge/domjudge

Version: 9.0.0DEV/fc07d9df1

2025-06-07
Last Analyzed
214,809
Lines of Code Analyze
4.01
Defect Density

Defects by status for current build

1,995
Total defects
504
Outstanding
1,431
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 1
311 Missing Encryption of Sensitive Data 1
327 Use of a Broken or Risky Cryptographic Algorithm 4
798 Use of Hard-coded Credentials 409
829 Inclusion of Functionality from Untrusted Control Sphere 2