-
-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Project organization changes #76
Conversation
"dev": true, | ||
"license": "MIT" | ||
}, | ||
"node_modules/jquery": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: Affected versions of jquery are vulnerable to Improper Neutralization Of Input During Web Page Generation ('Cross-Site Scripting').
Manual Review Advice: A vulnerability from this advisory is reachable if you pass HTML from untrusted sources to one of jQuery's DOM manipulation methods, including but not limited to .after()
, .append()
, .appendTo()
, .before()
, .html()
, .insertBefore()
, .insertAfter()
, .prepend()
, .prependTo()
, .prop()
, .replaceAll()
, .replaceWith()
, .val()
, .wrap()
, .wrapAll()
, and .wrapInner()
.
Fix: Upgrade this library to at least version 3.5.0 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6259.
Reference(s): GHSA-gxr4-xjj5-5px2, CVE-2020-11022
Ignore this finding from ssc-99ced192-711b-40d7-affb-568e45eab4e5."dev": true, | ||
"license": "MIT" | ||
}, | ||
"node_modules/jquery": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: Affected versions of jquery are vulnerable to Improper Neutralization Of Input During Web Page Generation ('Cross-Site Scripting').
Manual Review Advice: A vulnerability from this advisory is reachable if you pass HTML from untrusted sources to one of jQuery's DOM manipulation methods, including but not limited to .after()
, .append()
, .appendTo()
, .before()
, .html()
, .insertBefore()
, .insertAfter()
, .prepend()
, .prependTo()
, .prop()
, .replaceAll()
, .replaceWith()
, .val()
, .wrap()
, .wrapAll()
, and .wrapInner()
.
Fix: Upgrade this library to at least version 3.5.0 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6259.
Reference(s): GHSA-jpcq-cgw6-v4j6, CVE-2020-11023
Ignore this finding from ssc-bbe59642-9c39-4446-8f29-775c168afa9e."node": ">=0.8" | ||
} | ||
}, | ||
"node_modules/karma": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: karma 6.x before 6.3.14 is vulnerable to improper neutralization of input during web page generation ('cross-site scripting'). Karma does not enforce the HTTP protocol on the return_url
query parameter which leads to reflected cross-site scripting when providing a URL like https://$KARMA_ROOT/?return_url=javascript:alert(document.domain)
. Upgrade to karma 6.3.14.
Fix: Upgrade this library to at least version 6.3.14 at faction/WebContent/plugins/Chart.js-2.1.6/package-lock.json:6473.
Reference(s): GHSA-7x7c-qm48-pq9c, CVE-2022-0437
Ignore this finding from ssc-81a24017-d446-4018-a477-3c5a65306f7e.
No description provided.