-
Updated
Apr 11, 2021 - Go
vulnerabilities
Here are 376 public repositories matching this topic...
-
Updated
Apr 12, 2021 - Go
-
Updated
Feb 17, 2021
-
Updated
Apr 12, 2021 - Shell
-
Updated
Apr 12, 2021 - Ruby
-
Updated
Apr 13, 2021 - Python
-
Updated
Jan 26, 2021
-
Updated
Oct 27, 2020 - Shell
-
Updated
Apr 12, 2021 - TypeScript
-
Updated
Apr 9, 2021 - JavaScript
-
Updated
Apr 12, 2021 - Python
-
Updated
Apr 9, 2021 - PHP
-
Updated
Apr 12, 2021 - Python
-
Updated
Feb 19, 2021 - JavaScript
Migration to bcrypt
Context
- This is part of
release-1.5#148 - MEDIUM priority task
Tasks
- Remove dependency
bcrypt-nodejsinpackage.json - Add dependency
bcryptinpackage.json - Migrate file app/data/user-dao.js to bcrypt
- Validate the instalation with the local test
- Add and submit the chang
Upgrade dependencies
-
Updated
Aug 13, 2020 - C
-
Updated
Mar 21, 2021 - JavaScript
Is this a request for help?: Yes
Is this a BUG REPORT or a FEATURE REQUEST? (choose one): FEATURE REQUEST
Can we add a option to allow the engine update vulnerabilities database through specific proxy ser
-
Updated
Apr 8, 2021 - Python
-
Updated
Apr 13, 2021 - Go
-
Updated
Apr 12, 2021 - Shell
-
Updated
Mar 25, 2021 - Python
-
Updated
Jan 6, 2021 - Python
-
Updated
Nov 18, 2019
-
Updated
Sep 18, 2020 - C
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
Apr 24, 2020 - Solidity
-
Updated
Apr 12, 2021 - HTML
-
Updated
Sep 8, 2019 - C
Improve this page
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."
I note that there is a check whether the cluster is deployed into Azure Cloud .. see below.
I don't have a problem with that per se except that in a corporate environment I don't want to request a proxy whitelist exception with my CISO for an endpoint that we have no use for (http://www.azurespeed.com). Moreover, whilst this test will eventually timeout and the checks resume, it delays the pro