2
I Use This!
Low Activity
Analyzed about 4 hours ago. based on code collected about 4 hours ago.

Project Summary

Web Application for the Ohloh Stack. Currently Rails 4.2.7 & Ruby 2.2.5

Tags

blackduck openhub oss postgresql rails ruby rubyonrails

Apache License 2.0
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Sub-License

Private Use

Use Patent Claims

Forbidden

Hold Liable

Use Trademarks

Required

Include Copyright

State Changes

Include License

Include Notice

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    search using multiple tags to find exactly what you need
  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    learn about Open Hub updates and features on the Open Hub blog
About Project Security

Languages

Ruby
63%
SQL
19%
JavaScript
8%
7 Other
10%

30 Day Summary

Jul 14 2025 — Aug 13 2025

12 Month Summary

Aug 13 2024 — Aug 13 2025
  • 20 Commits
    Down -63 (75%) from previous 12 months
  • 3 Contributors
    Down -1 (25%) from previous 12 months

Ratings

1 user rates this project:
5.0
 
5.0/5.0
Click to add your rating
  
Review this Project!
 

Static Analysis ( Generated by Coverity Scan for Ohloh UI )

Repository URL: https://github.com/blackducksoftware/ohloh-ui

Version: 25072025

2025-07-25
Last Analyzed
1,015,984
Lines of Code Analyze
0.1
Defect Density

Defects by status for current build

208
Total defects
99
Outstanding
85
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 1
78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 4
79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 7
89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 13
352 Cross-Site Request Forgery (CSRF) 1
676 Use of Potentially Dangerous Function 1
798 Use of Hard-coded Credentials 9
829 Inclusion of Functionality from Untrusted Control Sphere 2
862 Missing Authorization 12