-
Updated
Oct 13, 2021 - Go
vulnerabilities
Here are 423 public repositories matching this topic...
-
Updated
Oct 11, 2021 - Go
-
Updated
Feb 17, 2021
-
Updated
Oct 14, 2021 - Shell
-
Updated
Oct 10, 2021 - Ruby
-
Updated
Sep 14, 2021
-
Updated
Oct 13, 2021 - TypeScript
-
Updated
Oct 27, 2020 - Shell
I note that there is a check whether the cluster is deployed into Azure Cloud .. see below.
I don't have a problem with that per se except that in a corporate environment I don't want to request a proxy whitelist exception with my CISO for an endpoint that we have no use for (http://www.azurespeed.com). Moreover, whilst this test will eventually timeout and the checks resume, it delays the pro
-
Updated
Oct 11, 2021 - JavaScript
-
Updated
Oct 4, 2021 - Python
-
Updated
Oct 5, 2021 - Python
-
Updated
Sep 12, 2021 - JavaScript
-
Updated
Oct 11, 2021 - Python
-
Updated
Sep 28, 2021 - JavaScript
-
Updated
Oct 13, 2021 - Shell
-
Updated
Oct 5, 2021 - PHP
-
Updated
Sep 28, 2021 - C
Migration to bcrypt
Context
- This is part of
release-1.5
#148 - MEDIUM priority task
Tasks
- Remove dependency
bcrypt-nodejs
inpackage.json
- Add dependency
bcrypt
inpackage.json
- Migrate file app/data/user-dao.js to bcrypt
- Validate the instalation with the local test
- Add and submit the chang
Upgrade dependencies
Is this a request for help?: Yes
Is this a BUG REPORT or a FEATURE REQUEST? (choose one): FEATURE REQUEST
Can we add a option to allow the engine update vulnerabilities database through specific proxy ser
-
Updated
Sep 17, 2021 - Go
-
Updated
Jul 31, 2021 - Python
-
Updated
Apr 24, 2020 - Solidity
-
Updated
Sep 7, 2021
-
Updated
Sep 14, 2021 - Python
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Jun 15, 2021 - C
OpenCVE update is great but sometime you could want to launch an import of the database manually.
Give OpenCVE the capability to do a opencve update-cve
for example
Our current documentation for using templates points users to the JSON output to learn about what data is available to the template author. This is insufficient, because although it currently describes the correct shape of data, it leaves users guessing at the correct casing for field names.
A better source of truth than the JSON output is the
Improve this page
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."