Skip to content

Conversation

@fabio-barros
Copy link
Owner

No description provided.

Signed-off-by: Fábio Barros <58121122+fabio-barros@users.noreply.github.com>
@github-actions
Copy link

Dependency Review

The following issues were found:
  • ❌ 1 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ✅ 0 package(s) with unknown licenses.
See the Details below.

Vulnerabilities

GHAS/GHAS.csproj

NameVersionVulnerabilitySeverity
DotNetNuke.Core9.3.0DotNetNuke.Core Vulnerable to Stored XSS via Module Titlecritical
DNN Vulnerable to Stored Cross-Site Scripting (XSS) in the Prompt modulecritical
DotNetNuke.Core Vulnerable to Stored XSS in Module Deletion Confirmation Modalhigh
DotNetNuke.Core Vulnerable to Stored XSS in Scheduler LogNoteshigh
DNN Path Traversal via Zip Sliphigh
DotNetNuke.Core has a potential XSS vulnerability in modules' header and footermoderate
DNN vulnerable to stored cross-site-scripting (XSS) via SVG uploadmoderate
DNN vulnerable to Reflected Cross-Site Scripting (XSS) using url to profilemoderate
DNN affected by Stored Cross-Site Scripting (XSS) in Profile Biography fieldmoderate
DNN allows loading unused themes on anonymous clients through query parametersmoderate
DNN allows Stored Cross-Site Scripting (XSS) with svg files rendered inlinemoderate
Reflected Cross-Site Scripting (XSS) in module actions in edit modemoderate
DotNetNuke.Core Vulnerable to Server-Side Request Forgery (SSRF)moderate
DNN XSS Vulnerabilitymoderate
DNN File Upload Vulnerabilitymoderate
DNN vulnerable to Relative Path Traversalmoderate
Stored Cross-Site Scripting vulnerability in admin component of DotNetNukemoderate
DNN Vulnerable to Stored XSS Using Backend Admin Credentialslow

OpenSSF Scorecard

PackageVersionScoreDetails
nuget/DotNetNuke.Core 9.3.0 🟢 3.1
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Maintained🟢 1030 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Security-Policy🟢 10security policy file detected
License🟢 10license file detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST⚠️ 0no SAST tool detected
Binary-Artifacts⚠️ 0binaries present in source code
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing⚠️ 0project is not fuzzed
Vulnerabilities⚠️ 014 existing vulnerabilities detected

Scanned Files

  • GHAS/GHAS.csproj

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants