You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Unsanitized Dynamic Input in File Path Description: The method fetchFileStreamFromURL in index.ts is vulnerable to unsanitized file path input. Location:packages/api/src/ticketing/@lib/@utils/index.ts Line: 11 Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path Description: Constructs a file path using unsanitized input, which may lead to a path traversal vulnerability. Location:packages/api/src/@core/connections/@utils/base.js Line: 81 Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path Description: The function updateFileContents in connectorUpdate.js is vulnerable to unsanitized input. Location:packages/api/scripts/connectorUpdate.js Line: 119 Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path Description: Unsanitized dynamic input in file path, allowing for potential path traversal. Location:packages/api/src/ats/attachment/services/ashby.js Line: 62 Repository: panoratech/Panora
Unsanitized Dynamic Input Detected Description: Unsanitized input in dynamic file path at connectorUpdate.js. Location:packages/api/scripts/connectorUpdate.js Line: 293 Repository: panoratech/Panora
Vulnerable Unsanitized Dynamic Input Description: Code has unsanitized dynamic input that poses a path traversal risk. Location:packages/api/scripts/connectorUpdate.js Line: 372 Repository: panoratech/Panora
Unsanitized Dynamic Input Detected Description: Dynamic input used unsafely in file path, vulnerable to path traversal attacks. Location:packages/api/scripts/connectorUpdate.js Line: 346 Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path
Description: The method
fetchFileStreamFromURL
inindex.ts
is vulnerable to unsanitized file path input.Location:
packages/api/src/ticketing/@lib/@utils/index.ts
Line: 11
Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path
Description: Constructs a file path using unsanitized input, which may lead to a path traversal vulnerability.
Location:
packages/api/src/@core/connections/@utils/base.js
Line: 81
Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path
Description: The function
updateFileContents
inconnectorUpdate.js
is vulnerable to unsanitized input.Location:
packages/api/scripts/connectorUpdate.js
Line: 119
Repository: panoratech/Panora
Unsanitized Dynamic Input in File Path
Description: Unsanitized dynamic input in file path, allowing for potential path traversal.
Location:
packages/api/src/ats/attachment/services/ashby.js
Line: 62
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: Unsanitized input in dynamic file path at
connectorUpdate.js
.Location:
packages/api/scripts/connectorUpdate.js
Line: 293
Repository: panoratech/Panora
Vulnerable Unsanitized Dynamic Input
Description: Code has unsanitized dynamic input that poses a path traversal risk.
Location:
packages/api/scripts/connectorUpdate.js
Line: 372
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: Dynamic input used unsafely in file path, vulnerable to path traversal attacks.
Location:
packages/api/scripts/connectorUpdate.js
Line: 346
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: Unsanitized input leads to potential path traversal vulnerability.
Location:
packages/api/scripts/connectorUpdate.js
Line: 442 - 445
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: Dynamic input not properly sanitized in file path, leading to security risk.
Location:
packages/api/scripts/connectorUpdate.js
Line: 377
Repository: panoratech/Panora
Vulnerable Unsanitized Dynamic Input
Description: Unsanitized input allows for file path manipulation.
Location:
packages/api/scripts/connectorUpdate.js
Line: 477 - 480
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: File path uses unsanitized dynamic input.
Location:
packages/api/scripts/connectorUpdate.js
Line: 428
Repository: panoratech/Panora
Unsanitized Dynamic Input Detected
Description: Unsafe dynamic input in file path at
connectorUpdate.js
.Location:
packages/api/scripts/connectorUpdate.js
Line: 289
Repository: panoratech/Panora
The text was updated successfully, but these errors were encountered: