Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Project organization changes #76

Merged
merged 3 commits into from
Oct 14, 2024
Merged

Project organization changes #76

merged 3 commits into from
Oct 14, 2024

Conversation

summitt
Copy link
Contributor

@summitt summitt commented Oct 14, 2024

No description provided.

"dev": true,
"license": "MIT"
},
"node_modules/jquery": {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: Affected versions of jquery are vulnerable to Improper Neutralization Of Input During Web Page Generation ('Cross-Site Scripting').

Manual Review Advice: A vulnerability from this advisory is reachable if you pass HTML from untrusted sources to one of jQuery's DOM manipulation methods, including but not limited to .after(), .append(), .appendTo(), .before(), .html(), .insertBefore(), .insertAfter(), .prepend(), .prependTo(), .prop(), .replaceAll(), .replaceWith(), .val(), .wrap(), .wrapAll(), and .wrapInner().

Fix: Upgrade this library to at least version 3.5.0 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6259.

Reference(s): GHSA-gxr4-xjj5-5px2, CVE-2020-11022

Ignore this finding from ssc-99ced192-711b-40d7-affb-568e45eab4e5.

"dev": true,
"license": "MIT"
},
"node_modules/jquery": {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: Affected versions of jquery are vulnerable to Improper Neutralization Of Input During Web Page Generation ('Cross-Site Scripting').

Manual Review Advice: A vulnerability from this advisory is reachable if you pass HTML from untrusted sources to one of jQuery's DOM manipulation methods, including but not limited to .after(), .append(), .appendTo(), .before(), .html(), .insertBefore(), .insertAfter(), .prepend(), .prependTo(), .prop(), .replaceAll(), .replaceWith(), .val(), .wrap(), .wrapAll(), and .wrapInner().

Fix: Upgrade this library to at least version 3.5.0 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6259.

Reference(s): GHSA-jpcq-cgw6-v4j6, CVE-2020-11023

Ignore this finding from ssc-bbe59642-9c39-4446-8f29-775c168afa9e.

"node": ">=0.8"
}
},
"node_modules/karma": {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: karma 6.x before 6.3.14 is vulnerable to improper neutralization of input during web page generation ('cross-site scripting'). Karma does not enforce the HTTP protocol on the return_url query parameter which leads to reflected cross-site scripting when providing a URL like https://$KARMA_ROOT/?return_url=javascript:alert(document.domain). Upgrade to karma 6.3.14.

Fix: Upgrade this library to at least version 6.3.14 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6473.

Reference(s): GHSA-7x7c-qm48-pq9c, CVE-2022-0437

Ignore this finding from ssc-81a24017-d446-4018-a477-3c5a65306f7e.

@summitt summitt merged commit 9e01fcf into main Oct 14, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant