-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Patchwork PR: Autofix #20
base: master
Are you sure you want to change the base?
Conversation
File Changed:
|
7848f2d
to
68397ee
Compare
Quality Gate passedIssues Measures |
@patched-bot Add comments to the code for the injection fix. |
1 similar comment
@patched-bot Add comments to the code for the injection fix. |
e526d29
to
40e7157
Compare
40e7157
to
9aed5e3
Compare
9aed5e3
to
5d4d23e
Compare
b13180b
to
01bb552
Compare
01bb552
to
2ccfcc0
Compare
2ccfcc0
to
21fc23f
Compare
21fc23f
to
c1173a0
Compare
Quality Gate passedIssues Measures |
This pull request from patched fixes 5 issues.
Fix ReDoS vulnerability by using hardcoded regex
Replaced user-supplied regex with a hardcoded version to mitigate ReDoS risk.Fixed ReDoS vulnerability by hardcoding regex
Use hardcoded regular expressions to prevent potential exploitation through user input.Fix ReDoS vulnerability in materialize.js
Fixed the ReDoS vulnerability by replacing dynamic regular expression construction with a pre-defined regex pattern check.Replace MD5 with Argon2id for secure password hashing
Replaced the use of insecure MD5 hashing algorithm with Argon2id from the cryptography package for secure password storage and verification in the User class.Fix SQL Injection vulnerability by using parameterized queries
Replaced dynamically constructed SQL queries with parameterized queries to prevent SQL Injection attacks. This approach is compliant with OWASP guidelines and ensures that user input is safely handled by the database.