You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 2, 2023. It is now read-only.
✅ Manifest File: package-lock.json
✅ Manifest File: Dockerfile
✅ Manifest File: travis/Dockerfile Vulnerabilities discovered in the following manifest file(s)
❌ Manifest File: pom.xml
Package Name: org.apache.commons:commons-compress Version : 1.18
Vulnerabilities
CVE ID: GHSA-53x6-4x5p-rrvv
Severity: High
Fixed in Version: 1.19
Description: The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
CVE ID: CVE-2019-12402
Severity: High
Fixed in Version: 1.19
Description: The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
GitSecure Vulnerablility Report
✅ Manifest File: package-lock.json
✅ Manifest File: Dockerfile
✅ Manifest File: travis/Dockerfile
Vulnerabilities discovered in the following manifest file(s)
❌ Manifest File: pom.xml
Package Name: org.apache.commons:commons-compress Version : 1.18
Vulnerabilities
The text was updated successfully, but these errors were encountered: