2lambda123 / dragonflyoss-Dragonfly2

Apache License 2.0
0 stars 0 forks source link

Fix code scanning alert - Vulnerabilities #61

Open 2lambda123 opened 2 weeks ago

2lambda123 commented 2 weeks ago

Tracking issue for:

git-greetings[bot] commented 2 weeks ago

Thanks @2lambda123 for opening this issue!

For COLLABORATOR only :

gitginie[bot] commented 2 weeks ago

@2lambda123! Thank you for your contribution to this repository! We appreciate your effort in opening issue. Happy coding!

git-greetings[bot] commented 2 weeks ago

First issue by @2lambda123

Issues Details of @2lambda123 in dragonflyoss-Dragonfly2 : OPEN CLOSED TOTAL
1 0 1
codeautopilot[bot] commented 2 weeks ago

Your organization has reached the subscribed usage limit. You can upgrade your account by purchasing a subscription at Stripe payment link

pairbot[bot] commented 2 weeks ago

Not Found

secure-code-warrior-for-github[bot] commented 2 weeks ago

Micro-Learning Topic: Header injection (Detected by phrase)

Matched on "header injection"

What is this? (2min video)

HTTP injection occurs when an application uses unsafe inputs within HTTP headers. This may allow an attacker to add or modify headers in the resulting HTTP response and therefore alter what is shown, inject arbitrary contents or poison intermediary caches.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Information disclosure (Detected by phrase)

Matched on "Information Exposure"

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Injection attack (Detected by phrase)

Matched on "injection attack"

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Sensitive information exposure (Detected by phrase)

Matched on "Sensitive Information Exposure"

What is this? (2min video)

Displaying too much information without proper access-control can lead to sensitive data being revealed that could be of value to an attacker directly or useful in a subsequent attack.

Try a challenge in Secure Code Warrior

Helpful references
pairbot[bot] commented 2 weeks ago

Not Found

pairbot[bot] commented 2 weeks ago

Not Found

secure-code-warrior-for-github[bot] commented 2 weeks ago

Micro-Learning Topic: Race condition (Detected by phrase)

Matched on "race condition"

What is this? (2min video)

A race condition is a flaw that produces an unexpected result when the timing of actions impact other actions.

Try a challenge in Secure Code Warrior

pairbot[bot] commented 2 weeks ago

Not Found