Showing 1,441 of 1,441 total issues
Block has too many lines. [198/25] Open
RSpec.describe 'RawData API', type: :request do
before(:each) do
@auth_token = ApplicationController.generate_auth_token
end
- Read upRead up
- Exclude checks
This cop checks if the length of a block exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable. The cop can be configured to ignore blocks passed to certain methods.
Class has too many lines. [209/100] Open
class RawDataController < BaseController
include Swagger::Blocks
before_action :set_raw_datum,
only: [
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Class has too many lines. [182/100] Open
class RawDatum < ApplicationRecord
include Swagger::Blocks
MIME_TYPES = {
text: [
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Block has too many lines. [156/25] Open
describe 'bulk creation' do
it 'creates no statistics for an empty list' do
expect(Statistic.count).to eq(0)
post api_v1_statistics_path(auth_token: @auth_token),
- Read upRead up
- Exclude checks
This cop checks if the length of a block exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable. The cop can be configured to ignore blocks passed to certain methods.
Class has too many lines. [131/100] Open
class InterfacesController < ApplicationController
before_action :authenticate_admin!
before_action :set_tempfiles,
only: [
:create,
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Block has too many lines. [139/25] Open
describe 'bulk creation' do
it 'creates no annotation documents for an empty list' do
raw_datum = FactoryGirl.create(:raw_datum)
expect(AnnotationDocument.count).to eq(0)
- Read upRead up
- Exclude checks
This cop checks if the length of a block exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable. The cop can be configured to ignore blocks passed to certain methods.
Block has too many lines. [139/25] Open
RSpec.describe 'Project merge', type: :request do
before(:each) do
stub_request(:get, 'http://example.com/merge')
.with(:headers => { 'Accept' => '*/*', 'Accept-Encoding' => 'gzip;q=1.0,deflate;q=0.6,identity;q=0.3', 'Host' => 'example.com', 'User-Agent' => 'Ruby' })
.to_return(status: 200, body: '', headers: {})
- Read upRead up
- Exclude checks
This cop checks if the length of a block exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable. The cop can be configured to ignore blocks passed to certain methods.
Block has too many lines. [135/25] Open
RSpec.describe AnnotationDocument, type: :model do
before(:each) do
@annotation_document = FactoryGirl.build(:annotation_document)
@annotation_document_with_different_admin = FactoryGirl.build(:annotation_document_with_different_admin,
interface_type: @annotation_document.interface_type)
- Read upRead up
- Exclude checks
This cop checks if the length of a block exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable. The cop can be configured to ignore blocks passed to certain methods.
Class has too many lines. [118/100] Open
class ServicesController < ApplicationController
include ServiceRoles
before_action :authenticate_admin!
before_action :set_service,
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Class has too many lines. [106/100] Open
class BreadcrumbBakery
include Rails.application.routes.url_helpers
def initialize(request)
tokens = url_tokens(request.original_url)
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Class has too many lines. [105/100] Open
class Project < ApplicationRecord
belongs_to :admin
belongs_to :iterate_service,
class_name: 'Service',
foreign_type: 'iterate_service'
- Read upRead up
- Exclude checks
This cop checks if the length a class exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.
Possible DoS Vulnerability in Action Controller Token Authentication Open
actionpack (5.0.6)
- Read upRead up
- Exclude checks
Advisory: CVE-2021-22904
Criticality: High
URL: https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ
Solution: upgrade to ~> 5.2.4.6, ~> 5.2.6, >= 6.0.3.7, ~> 6.0.3, >= 6.1.3.2
Inline SVG vulnerable to Cross-site Scripting Open
inline_svg (1.3.1)
- Read upRead up
- Exclude checks
Advisory: CVE-2020-36644
Criticality: Medium
URL: https://github.com/jamesmartin/inline_svg/pull/117
Solution: upgrade to >= 1.7.2
Update packaged dependency libxml2 from 2.9.10 to 2.9.12 Open
nokogiri (1.8.1)
- Read upRead up
- Exclude checks
Advisory:
Criticality: High
URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64
Solution: upgrade to >= 1.11.4
Nokogiri Command Injection Vulnerability via Nokogiri::CSS::Tokenizer#load_file Open
nokogiri (1.8.1)
- Read upRead up
- Exclude checks
Advisory: CVE-2019-5477
Criticality: Critical
URL: https://github.com/sparklemotion/nokogiri/issues/1915
Solution: upgrade to >= 1.10.4
HTTP Smuggling via Transfer-Encoding Header in Puma Open
puma (3.11.0)
- Read upRead up
- Exclude checks
Advisory: CVE-2020-11076
Criticality: High
URL: https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
Solution: upgrade to ~> 3.12.5, >= 4.3.4
Possible Strong Parameters Bypass in ActionPack Open
actionpack (5.0.6)
- Read upRead up
- Exclude checks
Advisory: CVE-2020-8164
Criticality: High
URL: https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY
Solution: upgrade to >= 5.2.4.3, ~> 5.2.4, >= 6.0.3.1
Possible XSS vulnerability in ActionView Open
actionview (5.0.6)
- Read upRead up
- Exclude checks
Advisory: CVE-2020-5267
Criticality: Medium
URL: https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8
Solution: upgrade to >= 5.2.4.2, ~> 5.2.4, >= 6.0.2.2
Possible DoS Vulnerability in Active Record PostgreSQL adapter Open
activerecord (5.0.6)
- Read upRead up
- Exclude checks
Advisory: CVE-2021-22880
Criticality: Medium
URL: https://groups.google.com/g/rubyonrails-security/c/ZzUqCh9vyhI
Solution: upgrade to >= 5.2.4.5, ~> 5.2.4, >= 6.0.3.5, ~> 6.0.3, >= 6.1.2.1
Paperclip ruby gem suffers from a Server-Side Request Forgery (SSRF) vulnerability
in the Paperclip::UriAdapter and Paperclip::HttpUrlProxyAdapter class. Open
paperclip (5.1.0)
- Read upRead up
- Exclude checks
Advisory: CVE-2017-0889
Criticality: Critical
URL: https://github.com/thoughtbot/paperclip/pull/2435
Solution: upgrade to >= 5.2.0