stevegrossi/stevegrossi

View on GitHub

Showing 190 of 190 total issues

Function keyup_checker has 33 lines of code (exceeds 25 allowed). Consider refactoring.
Open

    AbstractChosen.prototype.keyup_checker = function(evt) {
      var stroke, _ref;

      stroke = (_ref = evt.which) != null ? _ref : evt.keyCode;
      this.search_field_scale();
Severity: Minor
Found in app/assets/javascripts/jquery.chosen.js - About 1 hr to fix

    Function repositionFeet has 29 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

            var repositionFeet = function() {
                if(settings.positionContent) {
    
                    $(".footnote-content").each(function() {
    
    
    Severity: Minor
    Found in app/assets/javascripts/jquery.bigfoot.js - About 1 hr to fix

      Function keydown_checker has 28 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

          Chosen.prototype.keydown_checker = function(evt) {
            var stroke, _ref1;
      
            stroke = (_ref1 = evt.which) != null ? _ref1 : evt.keyCode;
            this.search_field_scale();
      Severity: Minor
      Found in app/assets/javascripts/jquery.chosen.js - About 1 hr to fix

        Function add_option has 26 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

            SelectParser.prototype.add_option = function(option, group_position, group_disabled) {
              if (option.nodeName.toUpperCase() === "OPTION") {
                if (option.text !== "") {
                  if (group_position != null) {
                    this.parsed[group_position].children += 1;
        Severity: Minor
        Found in app/assets/javascripts/jquery.chosen.js - About 1 hr to fix

          File Content Disclosure in Action View
          Open

              actionview (4.2.7.1)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2019-5418

          Criticality: High

          URL: https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q

          Solution: upgrade to >= 4.2.11.1, ~> 4.2.11, >= 5.0.7.2, ~> 5.0.7, >= 5.1.6.2, ~> 5.1.6, >= 5.2.2.1, ~> 5.2.2, >= 6.0.0.beta3

          ruby-ffi DDL loading issue on Windows OS
          Open

              ffi (1.9.3)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2018-1000201

          Criticality: High

          URL: https://github.com/ffi/ffi/releases/tag/1.9.24

          Solution: upgrade to >= 1.9.24

          Denial of Service Vulnerability in Action View
          Open

              actionview (4.2.7.1)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2019-5419

          Criticality: High

          URL: https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI

          Solution: upgrade to >= 6.0.0.beta3, >= 5.2.2.1, ~> 5.2.2, >= 5.1.6.2, ~> 5.1.6, >= 5.0.7.2, ~> 5.0.7, >= 4.2.11.1, ~> 4.2.11

          Potential remote code execution of user-provided local names in ActionView
          Open

              actionview (4.2.7.1)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2020-8163

          Criticality: High

          URL: https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0

          Solution: upgrade to >= 4.2.11.2

          Broken Access Control vulnerability in Active Job
          Open

              activejob (4.2.7.1)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2018-16476

          Criticality: High

          URL: https://groups.google.com/forum/#!topic/rubyonrails-security/FL4dSdzr2zw

          Solution: upgrade to ~> 4.2.11, ~> 5.0.7.1, ~> 5.1.6.1, ~> 5.1.7, >= 5.2.1.1

          XSS vulnerability in rails-html-sanitizer
          Open

              rails-html-sanitizer (1.0.3)
          Severity: Minor
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2018-3741

          URL: https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ

          Solution: upgrade to >= 1.0.4

          Possible XSS vulnerability in Rack
          Open

              rack (1.6.4)
          Severity: Minor
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2018-16471

          URL: https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o

          Solution: upgrade to ~> 1.6.11, >= 2.0.6

          TZInfo relative path traversal vulnerability allows loading of arbitrary files
          Open

              tzinfo (1.2.2)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2022-31163

          Criticality: High

          URL: https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx

          Solution: upgrade to ~> 0.3.61, >= 1.2.10

          Path Traversal in Sprockets
          Open

              sprockets (3.7.0)
          Severity: Critical
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2018-3760

          Criticality: High

          URL: https://groups.google.com/forum/#!topic/ruby-security-ann/2S9Pwz2i16k

          Solution: upgrade to < 3.0.0, >= 2.12.5, < 4.0.0, >= 3.7.2, >= 4.0.0.beta8

          Possible information leak / session hijack vulnerability
          Open

              rack (1.6.4)
          Severity: Minor
          Found in Gemfile.lock by bundler-audit

          Advisory: CVE-2019-16782

          Criticality: Medium

          URL: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3

          Solution: upgrade to ~> 1.6.12, >= 2.0.8

          Avoid deeply nested control flow statements.
          Open

                        if (results_group != null) {
                          results_group.group_match = true;
                        }
          Severity: Major
          Found in app/assets/javascripts/jquery.chosen.js - About 45 mins to fix

            Avoid deeply nested control flow statements.
            Open

                          if (searchText.length) {
                            startpos = option.search_text.search(zregex);
                            text = option.search_text.substr(0, startpos + searchText.length) + '</em>' + option.search_text.substr(startpos + searchText.length);
                            option.search_text = text.substr(0, startpos) + '<em>' + text.substr(startpos);
                          }
            Severity: Major
            Found in app/assets/javascripts/jquery.chosen.js - About 45 mins to fix

              Avoid deeply nested control flow statements.
              Open

                          } else if ((option.group_array_index != null) && this.results_data[option.group_array_index].search_match) {
                            option.search_match = true;
                          }
              Severity: Major
              Found in app/assets/javascripts/jquery.chosen.js - About 45 mins to fix

                Function addBreakpoint has 5 arguments (exceeds 4 allowed). Consider refactoring.
                Open

                        var addBreakpoint = function(size, deleteDelay, removeOpen,
                                                trueCallback, falseCallback) {
                Severity: Minor
                Found in app/assets/javascripts/jquery.bigfoot.js - About 35 mins to fix

                  Function addBreakpoint has 5 arguments (exceeds 4 allowed). Consider refactoring.
                  Open

                              addBreakpoint: function(size, deleteDelay, removeOpen, trueCallback, falseCallback) {
                  Severity: Minor
                  Found in app/assets/javascripts/jquery.bigfoot.js - About 35 mins to fix

                    Render path contains parameter value
                    Open

                        = render @posts, feature_first: params[:page].nil?
                    Severity: Minor
                    Found in app/views/posts/index.html.slim by brakeman

                    When a call to render uses a dynamically generated path, template name, file name, or action, there is the possibility that a user can access templates that should be restricted. The issue may be worse if those templates execute code or modify the database.

                    This warning is shown whenever the path to be rendered is not a static string or symbol.

                    These warnings are often false positives, however, because it can be difficult to manipulate Rails' assumptions about paths to perform malicious behavior. Reports of dynamic render paths should be checked carefully to see if they can actually be manipulated maliciously by the user.

                    Severity
                    Category
                    Status
                    Source
                    Language