Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release/2.8.0 #3051

Open
wants to merge 326 commits into
base: develop
Choose a base branch
from

Merge pull request #3064 from SCADA-LTS/fix/#3063_Fixed_data_point_an…

4c66d90
Select commit
Loading
Failed to load commit list.
Open

Release/2.8.0 #3051

Merge pull request #3064 from SCADA-LTS/fix/#3063_Fixed_data_point_an…
4c66d90
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL succeeded Dec 18, 2024 in 3s

7 new alerts including 7 medium severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 7 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 87 in src/br/org/scadabr/vo/exporter/ZIPProjectManager.java

See this annotation in the file changed.

Code scanning / CodeQL

HTTP response splitting Medium

This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.

Check warning on line 152 in src/com/serotonin/mango/web/servlet/HttpDataSourceServlet.java

See this annotation in the file changed.

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 160 in src/com/serotonin/mango/web/servlet/HttpDataSourceServlet.java

See this annotation in the file changed.

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 451 in src/org/scada_lts/web/mvc/api/PointValueAPI.java

See this annotation in the file changed.

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 486 in src/org/scada_lts/web/mvc/api/PointValueAPI.java

See this annotation in the file changed.

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 518 in src/org/scada_lts/web/mvc/api/PointValueAPI.java

See this annotation in the file changed.

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 21 in src/org/scada_lts/web/ws/config/HeadersFromSystemSettingsWriter.java

See this annotation in the file changed.

Code scanning / CodeQL

HTTP response splitting Medium

This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.
This header depends on a
user-provided value
, which may cause a response-splitting vulnerability.