-
Notifications
You must be signed in to change notification settings - Fork 200
fix: Vulnerabilities: Input Sanitization #712
Description
-
Unsanitized Dynamic Input in File Path
Description: The methodfetchFileStreamFromURLinindex.tsis vulnerable to unsanitized file path input.
Location:packages/api/src/ticketing/@lib/@utils/index.ts
Line: 11
Repository: panoratech/Panora -
Unsanitized Dynamic Input in File Path
Description: Constructs a file path using unsanitized input, which may lead to a path traversal vulnerability.
Location:packages/api/src/@core/connections/@utils/base.js
Line: 81
Repository: panoratech/Panora -
Unsanitized Dynamic Input in File Path
Description: The functionupdateFileContentsinconnectorUpdate.jsis vulnerable to unsanitized input.
Location:packages/api/scripts/connectorUpdate.js
Line: 119
Repository: panoratech/Panora -
Unsanitized Dynamic Input in File Path
Description: Unsanitized dynamic input in file path, allowing for potential path traversal.
Location:packages/api/src/ats/attachment/services/ashby.js
Line: 62
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: Unsanitized input in dynamic file path atconnectorUpdate.js.
Location:packages/api/scripts/connectorUpdate.js
Line: 293
Repository: panoratech/Panora -
Vulnerable Unsanitized Dynamic Input
Description: Code has unsanitized dynamic input that poses a path traversal risk.
Location:packages/api/scripts/connectorUpdate.js
Line: 372
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: Dynamic input used unsafely in file path, vulnerable to path traversal attacks.
Location:packages/api/scripts/connectorUpdate.js
Line: 346
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: Unsanitized input leads to potential path traversal vulnerability.
Location:packages/api/scripts/connectorUpdate.js
Line: 442 - 445
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: Dynamic input not properly sanitized in file path, leading to security risk.
Location:packages/api/scripts/connectorUpdate.js
Line: 377
Repository: panoratech/Panora -
Vulnerable Unsanitized Dynamic Input
Description: Unsanitized input allows for file path manipulation.
Location:packages/api/scripts/connectorUpdate.js
Line: 477 - 480
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: File path uses unsanitized dynamic input.
Location:packages/api/scripts/connectorUpdate.js
Line: 428
Repository: panoratech/Panora -
Unsanitized Dynamic Input Detected
Description: Unsafe dynamic input in file path atconnectorUpdate.js.
Location:packages/api/scripts/connectorUpdate.js
Line: 289
Repository: panoratech/Panora