You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Details: A potential security vulnerability has been introduced by changing the URL for the PDF report link.
Affected Code Snippet:
<p>The 2006 community efforts of Altoro Mutual and our employees is quite impressive including charitable contributions, volunteerism, diversity initiatives, and other support. <ahref="https://www.adobe.com/products/acrobat/readstep2.html">View</a> the summary report (PDF, 800KB).</p>
Start Line: 12
End Line: 12
Details: The removal of the 'alt' attribute from the image tag violates accessibility standards and deviates from the original coding standards.
Affected Code Snippet:
<p><imgsrc="images/adobe.gif" border=0><br/>
Start Line: 14
End Line: 14
File Changed: WebContent/swagger/lib/marked.js
Details: The modification introduces a potential bug by using a hardcoded regex pattern instead of the original dynamic one.
Details: Violation of Rule 3 detected. The code modifications deviate from the original coding standards by changing the indentation and formatting of the conditional statements.
Details: Another violation of Rule 3 detected. Similar to the previous violation, the code modifications change the indentation and formatting of the conditional statements in another part of the file.
Details: No violation of Rule 2 detected. In fact, the changes improve security by adding HttpOnly and Secure flags to the cookie.
Affected Code Snippet:
//Set the HttpOnly flag for the cookieaccountCookie.setHttpOnly(true);
//Set the secure flag for the cookieaccountCookie.setSecure(true);
Start Line: 95
End Line: 98
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This pull request from patched fixes 8 issues.
Fix: Use hardcoded regexes to avoid ReDoS
- Updated the replace function to take a hardcoded regex instead of dynamic one.Fix: Hardcode regex to prevent potential ReDoS
This commit hardcodes the regex to prevent a potential ReDoS attack.Fix vulnerability by replacing plaintext HTTP URL with HTTPS URL
The plaintext HTTP URL in the anchor link has been replaced with an encrypted HTTPS URL.Change HTTP to HTTPS Link
Changed the http:// url to a secure https:// urlFix: Prefer encrypted HTTPS URL over plaintext HTTP URL
Replaces the plaintext HTTP URL in the href attribute of the Analyst Reviews link with an encrypted HTTPS URL.Fix: Change url to https and remove alt text from the image.
- Changed the URL from plaintext HTTP to encrypted HTTPS.Fix Missing parameter validation when a user attempts to change their password
Added a null check for all parameters passed into the changePassword method in the AdminServlet class.Fixed cookie security attributes
- Set the 'HttpOnly' flag on the cookie to prevent client-side scripts from reading the cookie.