[WIP] CycloneDX v2.0 Specification #652
11 new alerts including 11 high severity security vulnerabilities
New alerts in code changed by this pull request
Security Alerts:
- 11 high
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Check failure on line 169 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 170 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 190 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 203 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 217 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 325 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 326 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 339 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 340 in tools/src/main/js/bundler/bundle-schemas.js
Code scanning / CodeQL
Uncontrolled data used in path expression High
Check failure on line 101 in tools/src/main/js/linter/checks/description-full-stop.check.js
Code scanning / CodeQL
Polynomial regular expression used on uncontrolled data High
Check failure on line 101 in tools/src/main/js/linter/checks/description-full-stop.check.js
Code scanning / CodeQL
Polynomial regular expression used on uncontrolled data High