rootstrap/exception_hunter

View on GitHub

Showing 42 of 42 total issues

Function generateTOC has 61 lines of code (exceeds 25 allowed). Consider refactoring.
Open

function generateTOC() {
  if ($('#filecontents').length === 0) return;
  var _toc = $('<ol class="top"></ol>');
  var show = false;
  var toc = _toc;
Severity: Major
Found in docs/js/app.js - About 2 hrs to fix

    Complex method ExceptionHunter::Middleware::DelayedJobHunter::environment_data (42.9)
    Open

          def self.environment_data(job)
            job_data =
              JOB_TRACKED_DATA.reduce({}) do |dict, data_param|
                dict.merge(data_param => job.try(data_param))
              end

    Flog calculates the ABC score for methods. The ABC score is based on assignments, branches (method calls), and conditions.

    You can read more about ABC metrics or the flog tool

    Function constantSummaryToggle has 39 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

    function constantSummaryToggle() {
      $('.constants_summary_toggle').click(function(e) {
        e.preventDefault();
        localStorage.summaryCollapsed = $(this).text();
        $('.constants_summary_toggle').each(function() {
    Severity: Minor
    Found in docs/js/app.js - About 1 hr to fix

      Function summaryToggle has 27 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

      function summaryToggle() {
        $('.summary_toggle').click(function(e) {
          e.preventDefault();
          localStorage.summaryCollapsed = $(this).text();
          $('.summary_toggle').each(function() {
      Severity: Minor
      Found in docs/js/app.js - About 1 hr to fix

        Possible exposure of information vulnerability in Action Pack
        Open

            actionpack (6.1.3.2)
        Severity: Critical
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-23633

        Criticality: High

        URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ

        Solution: upgrade to >= 5.2.6.2, ~> 5.2.6, >= 6.0.4.6, ~> 6.0.4, >= 6.1.4.6, ~> 6.1.4, >= 7.0.2.2

        Possible XSS Vulnerability in Action View tag helpers
        Open

            actionview (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-27777

        Criticality: Medium

        URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw

        Solution: upgrade to >= 5.2.7.1, ~> 5.2.7, >= 6.0.4.8, ~> 6.0.4, >= 6.1.5.1, ~> 6.1.5, >= 7.0.2.4

        Denial of Service Vulnerability in ActiveRecord’s PostgreSQL adapter
        Open

            activerecord (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-44566

        URL: https://github.com/rails/rails/releases/tag/v7.0.4.1

        Solution: upgrade to >= 5.2.8.15, ~> 5.2.8, >= 6.1.7.1, ~> 6.1.7, >= 7.0.4.1

        SQL Injection Vulnerability via ActiveRecord comments
        Open

            activerecord (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2023-22794

        URL: https://github.com/rails/rails/releases/tag/v7.0.4.1

        Solution: upgrade to >= 6.0.6.1, ~> 6.0.6, >= 6.1.7.1, ~> 6.1.7, >= 7.0.4.1

        Denial of service via header parsing in Rack
        Open

            rack (2.2.3)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-44570

        URL: https://github.com/rack/rack/releases/tag/v3.0.4.1

        Solution: upgrade to >= 2.0.9.2, ~> 2.0.9, >= 2.1.4.2, ~> 2.1.4, >= 2.2.6.2, ~> 2.2.6, >= 3.0.4.1

        Denial of service via multipart parsing in Rack
        Open

            rack (2.2.3)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-44572

        URL: https://github.com/rack/rack/releases/tag/v3.0.4.1

        Solution: upgrade to >= 2.0.9.2, ~> 2.0.9, >= 2.1.4.2, ~> 2.1.4, >= 2.2.6.1, ~> 2.2.6, >= 3.0.4.1

        Possible Open Redirect in Host Authorization Middleware
        Open

            actionpack (6.1.3.2)
        Severity: Critical
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2021-22942

        Criticality: High

        URL: https://groups.google.com/g/rubyonrails-security/c/wB5tRn7h36c

        Solution: upgrade to >= 6.0.4.1, ~> 6.0.4, >= 6.1.4.1

        ReDoS based DoS vulnerability in Action Dispatch
        Open

            actionpack (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2023-22795

        URL: https://github.com/rails/rails/releases/tag/v7.0.4.1

        Solution: upgrade to >= 5.2.8.15, ~> 5.2.8, >= 6.1.7.1, ~> 6.1.7, >= 7.0.4.1

        Possible XSS Vulnerability in Action Pack
        Open

            actionpack (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-22577

        Criticality: Medium

        URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI

        Solution: upgrade to >= 5.2.7.1, ~> 5.2.7, >= 6.0.4.8, ~> 6.0.4, >= 6.1.5.1, ~> 6.1.5, >= 7.0.2.4

        Possible code injection vulnerability in Rails / Active Storage
        Open

            activestorage (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-21831

        Criticality: Critical

        URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI

        Solution: upgrade to >= 5.2.6.3, ~> 5.2.6, >= 6.0.4.7, ~> 6.0.4, >= 6.1.4.7, ~> 6.1.4, >= 7.0.2.3

        ReDoS based DoS vulnerability in Active Support’s underscore
        Open

            activesupport (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2023-22796

        URL: https://github.com/rails/rails/releases/tag/v7.0.4.1

        Solution: upgrade to >= 5.2.8.15, ~> 5.2.8, >= 6.1.7.1, ~> 6.1.7, >= 7.0.4.1

        Denial of Service Vulnerability in Rack Content-Disposition parsing
        Open

            rack (2.2.3)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-44571

        URL: https://github.com/rack/rack/releases/tag/v3.0.4.1

        Solution: upgrade to >= 2.0.9.2, ~> 2.0.9, >= 2.1.4.2, ~> 2.1.4, >= 2.2.6.1, ~> 2.2.6, >= 3.0.4.1

        ReDoS based DoS vulnerability in Action Dispatch
        Open

            actionpack (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2023-22792

        URL: https://github.com/rails/rails/releases/tag/v7.0.4.1

        Solution: upgrade to >= 5.2.8.15, ~> 5.2.8, >= 6.1.7.1, ~> 6.1.7, >= 7.0.4.1

        Possible Open Redirect in Host Authorization Middleware
        Open

            actionpack (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2021-44528

        Criticality: Medium

        URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ

        Solution: upgrade to >= 6.0.4.2, ~> 6.0.4, >= 6.1.4.2, ~> 6.1.4, >= 7.0.0.rc2

        Possible RCE escalation bug with Serialized Columns in Active Record
        Open

            activerecord (6.1.3.2)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-32224

        Criticality: Critical

        URL: https://groups.google.com/g/rubyonrails-security/c/MmFO3LYQE8U

        Solution: upgrade to >= 5.2.8.1, ~> 5.2.8, >= 6.0.5.1, ~> 6.0.5, >= 6.1.6.1, ~> 6.1.6, >= 7.0.3.1

        Possible shell escape sequence injection vulnerability in Rack
        Open

            rack (2.2.3)
        Severity: Minor
        Found in Gemfile.lock by bundler-audit

        Advisory: CVE-2022-30123

        Criticality: Critical

        URL: https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8

        Solution: upgrade to >= 2.0.9.1, ~> 2.0.9, >= 2.1.4.1, ~> 2.1.4, >= 2.2.3.1

        Severity
        Category
        Status
        Source
        Language