-
Updated
Aug 15, 2021 - Go
vulnerabilities
Here are 414 public repositories matching this topic...
-
Updated
Aug 12, 2021 - Go
-
Updated
Feb 17, 2021
-
Updated
Aug 14, 2021 - Shell
-
Updated
Aug 2, 2021 - Ruby
-
Updated
Aug 13, 2021 - Python
-
Updated
Jun 12, 2021
-
Updated
Aug 13, 2021 - TypeScript
-
Updated
Oct 27, 2020 - Shell
-
Updated
Jul 23, 2021 - JavaScript
-
Updated
Aug 14, 2021 - JavaScript
-
Updated
Aug 2, 2021 - Python
-
Updated
Jul 14, 2021 - JavaScript
-
Updated
Aug 11, 2021 - PHP
-
Updated
Aug 11, 2021 - JavaScript
-
Updated
Apr 16, 2021 - Python
-
Updated
Jul 26, 2021 - C
-
Updated
Aug 9, 2021 - Shell
Migration to bcrypt
Context
- This is part of
release-1.5
#148 - MEDIUM priority task
Tasks
- Remove dependency
bcrypt-nodejs
inpackage.json
- Add dependency
bcrypt
inpackage.json
- Migrate file app/data/user-dao.js to bcrypt
- Validate the instalation with the local test
- Add and submit the chang
Upgrade dependencies
Is this a request for help?: Yes
Is this a BUG REPORT or a FEATURE REQUEST? (choose one): FEATURE REQUEST
Can we add a option to allow the engine update vulnerabilities database through specific proxy ser
-
Updated
Jul 4, 2021 - Go
-
Updated
Jul 31, 2021 - Python
-
Updated
Jul 27, 2021 - Python
-
Updated
Apr 24, 2020 - Solidity
-
Updated
Jun 15, 2021 - C
-
Updated
Jul 24, 2021
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
May 10, 2021
Improve this page
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."
I note that there is a check whether the cluster is deployed into Azure Cloud .. see below.
I don't have a problem with that per se except that in a corporate environment I don't want to request a proxy whitelist exception with my CISO for an endpoint that we have no use for (http://www.azurespeed.com). Moreover, whilst this test will eventually timeout and the checks resume, it delays the pro