Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Veracode Batch Fix #30

Open
wants to merge 2 commits into
base: sa-ny-patch-16
Choose a base branch
from

Conversation

github-actions[bot]
Copy link


VERACOE-FIX CODE SUGGESTIONS

Caution

Breaking Flaws identified in code!

Fixes for application/views/userController.py:
Falws found for this file:
CWE 327 - Use of a Broken or Risky Cryptographic Algorithm - Severity 3 on line 412 for issue 1014
CWE 601 - URL Redirection to Untrusted Site ('Open Redirect') - Severity 3 on line 96 for issue 1027
CWE 73 - External Control of File Name or Path - Severity 3 on line 661 for issue 1083
CWE 80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - Severity 3 on line 197 for issue 1022
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 523 for issue 1075
CWE 601 - URL Redirection to Untrusted Site ('Open Redirect') - Severity 3 on line 437 for issue 1074
CWE 73 - External Control of File Name or Path - Severity 3 on line 701 for issue 1058
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 261 for issue 1068
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 227 for issue 1065
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 186 for issue 1040
CWE 73 - External Control of File Name or Path - Severity 3 on line 702 for issue 1057
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 420 for issue 1073
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 494 for issue 1079
CWE 80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - Severity 3 on line 560 for issue 1086
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 513 for issue 1077
CWE 73 - External Control of File Name or Path - Severity 3 on line 787 for issue 1094
CWE 80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) - Severity 3 on line 199 for issue 1039
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 342 for issue 1071
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 733 for issue 1093
CWE 601 - URL Redirection to Untrusted Site ('Open Redirect') - Severity 3 on line 93 for issue 1029
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 586 for issue 1082
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 139 for issue 1020
CWE 327 - Use of a Broken or Risky Cryptographic Algorithm - Severity 3 on line 105 for issue 1012
CWE 73 - External Control of File Name or Path - Severity 3 on line 648 for issue 1085
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 774 for issue 1096
CWE 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - Severity 4 on line 111 for issue 1031

This PR is created by the Veracode-Fix bot to help fix security defects on your code

The base branch is sa-ny-patch-16 the base commit sha is b805516

Please reach out to your Veracode team if anything in question

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant