-
👋 Hello, @JPeer264 - a potential high severity OS Command Injection (CWE-78) vulnerability in your repository has been disclosed to us.
#### Next Steps
1️⃣ Visit **https://huntr.dev/bounties/1-…
-
Vulnerable Library - keras-2.11.0-py2.py3-none-any.whl
Multi-backend Keras.
Library home page: https://files.pythonhosted.org/packages/de/44/bf1b0eef5b13e6201aef076ff34b91bc40aace8591cd273c1c2a94a9c…
-
## CVE-2024-3660 - Critical Severity Vulnerability
Vulnerable Library - keras-2.11.0-py2.py3-none-any.whl
Multi-backend Keras.
Library home page: https://files.pythonhosted.org/packages/de/44/bf1b0e…
-
**Command_Injection** issue exists @ **website/passcheck.php** in branch **master**
*The application's <?php method calls an OS (shell) command with exec, at line 1 of website\passcheck.php, usi…
-
Vulnerable Library - paddlepaddle-2.3.2-cp37-cp37m-manylinux1_x86_64.whl
Parallel Distributed Deep Learning
Library home page: https://files.pythonhosted.org/packages/35/ae/bb0e011f11c026856c643ac3f…
-
**Command_Injection** issue exists @ **createaccount.php** in branch **master**
*The application's <?php method calls an OS (shell) command with mail, at line 1 of createaccount.php, using an un…
-
**Background**
Brakeman version: 3.6.1
Rails version: 4.2.7.1
Ruby version: 2.1.2
Hi, sorry if this is a stupid question, but ive trying for a few days to fix my command injection warning:
…
-
### Background
Brakeman version: 4.3.0
Ruby version: 2.3.7p456
### Issue
When a `File.join` call is interpolated into a system call, brakeman does not correctly determine if the resulting va…
-
### Background
Brakeman version: 4.3.1
Rails version: 5.2.0
Ruby version: 2.5.1
### Issue
// What problem are you seeing? Consult the relevant section below if possible.
#### False Posit…
-
it is possible to run os commands when opening urls, eg:
```
open('https://$(calc.exe)')
```
opens the default browser, but als runs `calc.exe`
### expected
the url argument should be suff…