-
Updated
Jul 3, 2020 - Go
vulnerabilities
Here are 278 public repositories matching this topic...
The email address provided in the "Commercial Uses" section in LICENSE.md is invalid. Emails send to that address return with "User unknown" notice.
-
Updated
Apr 12, 2020
-
Updated
Jul 5, 2020 - Shell
-
Updated
Apr 15, 2020 - Shell
-
Updated
May 30, 2020
-
Updated
Jun 23, 2020 - JavaScript
node -v: v10.16.3npm -v: 6.9.0snyk -v: 1.127.3- Command run: snyk wizard
(click to expand)
$ npx snyk wizard
Snyk's wizard will:
* Enumerate your local dependencies and query Snyk's servers for vulnerabilities
* Guide you through fixing found vulnerabilities
* Create a .snyk policy file to guide snyk commands such as `test` -
Updated
Jun 8, 2020 - JavaScript
-
Updated
Jun 25, 2020 - HTML
(This old idea popped up to my mind while discussing #219.)
To be both consistent and more intuitive, etc/plugins.txt should be rename etc/plugins.ini.
*.ini or *.conf carry a meaning, whereas *.txt is not. Since the base of cve-search uses *.ini , let's stick to that. Python configparser documentation also refer to "INI fi
Upgrade dependencies
Context
- This is part of
release-1.5#148 - Context from #82
- Critical task
Tasks
- Upgrade dependencies to secure latest versions in
package.json - Validate the instalation with the local test
- Add and submit the changes in
package-lock.json - Add the primary depdency list to the
readme.md - Check that the npm tasks are working as expected
- [
-
Updated
May 19, 2020 - C
-
Updated
Jul 3, 2020
Currently, engine does not support matching vulnerabilities against the busybox "package" itself. Detected applications are scanned (npm, python, java, etc), but because there aren't os packages as with Centos, Deb, etc there is no "os package" vuln scanning support.
The solution is to add a virtual package to the anchore analysis for the busybox binary itself, which anchore already detects as
-
Updated
Jun 23, 2020 - Python
-
Updated
Nov 18, 2019
-
Updated
Sep 8, 2019 - C
-
Updated
Apr 4, 2019
The test responds with a URL that is missing. We either need to create the page, or change this to link back to the old tutorial if nothing changed from a functional standpoint between R4/R5.
rspec ./spec/vulnerabilities/mass_assignment_spec.rb:12 # mass assignment attack one
rspec ./spec/vulnerabilities/mass_assignment_spec.rb:26 # mass assignment attack two, Tutorial: https://github.com
As requested, I am pointing to a comment you solicited regarding some improvements I would suggest for dawnscanner. The improvements are:
- Document all scans that are performed, grouping them by type of scan and detailing what they scan
- Consider not using a centralized scan directory at the top level of the user home dir
- Document the scan results DB and dir structure
For original com
-
Updated
Apr 24, 2020 - Solidity
-
Updated
May 29, 2020 - C
-
Updated
Aug 2, 2018 - Python
-
Updated
Mar 18, 2020 - Python
https://docs.dependencytrack.org/integrations/badges/
Current Behavior:
You need to hardcode version (or UUID - which changes by version (!)) in the url for the badge - it would be more convenient to have an url for latest version.
Proposed Behavior:
Just point at name and get semver latest version (or latest scanned version) - this way the url can be stable in READMEs etc.
-
Updated
Apr 24, 2020 - Shell
-
Updated
Mar 24, 2020 - JavaScript
Improve this page
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."