Skip to content
#

Security

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 1,464 public repositories matching this topic...

DeLuca92
DeLuca92 commented May 2, 2022

Is your feature request related to a problem?

The Traditional and Traditional Plus JSON reports treat "Other Info" as consistent between alerts which is not always the case. A new JSON report should be added which treats "Other Info" as potentially unique per alert instance.

As per the original issue a perfect way to test/experience this need is the Retire.JS passive scan alerts which i

enhancement IdealFirstBug add-on good first issue
cryptomator
gimmic
gimmic commented Sep 27, 2019

I have noticed when ingesting backlog(older timestamped data) that the "Messages per minute" line graph and "sources" data do not line up.

The Messages per minute appear to be correct for the ingest rate, but the sources breakdown below it only show messages for each type from within the time window via timestamp. This means in the last hour if you've ingested logs from 2 days ago, the data is

find-sec-bugs
h3xstream
h3xstream commented Oct 5, 2020

Description

BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.

Code

import org.apache.commons.beanutils.BeanUtils;

public

iText 7 for Java represents the next level of SDKs for developers that want to take advantage of the benefits PDF can bring. Equipped with a better document engine, high and low-level programming capabilities and the ability to create, edit and enhance PDF documents, iText 7 can be a boon to nearly every workflow.

  • Updated Jul 8, 2022
  • Java
dependency-track
pacbot
marshmallowrobot
marshmallowrobot commented Nov 10, 2020

Summary

Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.

Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma

good first issue dependencies

😸一个快速开发脚手架,快速搭建企业级后台管理系统,并提供多种便捷starter进行功能扩展。主要功能包括前后台用户分离,菜单权限,数据权限,定时任务,访问日志,操作日志,异常日志,统一异常处理,XSS过滤,SQL防注入,国际化 等多种功能

  • Updated Jul 2, 2022
  • Java
Wikipedia
Wikipedia

Security apps

Cloudback Backup

Automatic backups of your repos, metadata and even LFS. Backup to AWS, Azure, OneDrive, GCP, and more. Instant restores

GitProtect.io Backup

Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support

GuardRails

GuardRails provides continuous security feedback for modern development teams

Renovate

Keep dependencies up-to-date with automated Pull Requests

LGTM

Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review

Mend Bolt

Detect open source vulnerabilities in real time with suggested fixes for quick remediation

Semgrep

Code scanning at ludicrous speed. Find bugs and enforce code standards

Snyk

Find, fix (and prevent!) known vulnerabilities in your code

See more Security apps