-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add the new version and the 10.2 base version #7
Conversation
This comment has been minimized.
This comment has been minimized.
1 similar comment
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
24 similar comments
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
672f809
to
56d5a16
Compare
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2020-17521 ] org.codehaus.groovy:groovy-all 2.4.8Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
@pentaho/millenniumfalcon please review