Skip to content

Commit 66ba8d9

Browse files
committed
refs #000: Update security-checker.html
1 parent f70d9dc commit 66ba8d9

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

tests/expected_reports/security-checker.html

+12-12
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ <h1>security-checker</h1>
2828
* CVE-2014-5011: Information Disclosure
2929
https://github.com/dompdf/dompdf/releases/tag/v0.6.2
3030

31-
* CVE-2014-5013: Remote Code Execution (complement of CVE-2014-2383)
32-
https://github.com/dompdf/dompdf/releases/tag/v0.6.2
33-
3431
* CVE-2023-23924: Dompdf vulnerable to URI validation failure on SVG parsing
3532
https://github.com/advisories/GHSA-3cw5-7cxw-v5qg
3633

34+
* CVE-2014-5013: Remote Code Execution (complement of CVE-2014-2383)
35+
https://github.com/dompdf/dompdf/releases/tag/v0.6.2
36+
3737
drupal/core (8.9.13)
3838
--------------------
3939

@@ -43,12 +43,12 @@ <h1>security-checker</h1>
4343
* CVE-2020-13672: Drupal core - Critical - Cross-site scripting - SA-CORE-2021-002
4444
https://www.drupal.org/sa-core-2021-002
4545

46-
* CVE-2022-25277: Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2022-014
47-
https://www.drupal.org/sa-core-2022-014
48-
4946
* Drupal core - Moderately critical - Third-party libraries - SA-CORE-2021-005
5047
https://www.drupal.org/sa-core-2021-005
5148

49+
* CVE-2022-25277: Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2022-014
50+
https://www.drupal.org/sa-core-2022-014
51+
5252
* CVE-2021-33829: Drupal core - Critical - Cross-site scripting - SA-CORE-2021-003
5353
https://www.drupal.org/sa-core-2021-003
5454

@@ -58,18 +58,18 @@ <h1>security-checker</h1>
5858
guzzlehttp/guzzle (6.5.4)
5959
-------------------------
6060

61-
* CVE-2022-29248: Cross-domain cookie leakage
62-
https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
63-
64-
* CVE-2022-31091: Change in port should be considered a change in origin
65-
https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
66-
6761
* CVE-2022-31090: CURLOPT_HTTPAUTH option not cleared on change of origin
6862
https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
6963

7064
* CVE-2022-31042: Failure to strip the Cookie header on change in host or HTTP downgrade
7165
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
7266

67+
* CVE-2022-29248: Cross-domain cookie leakage
68+
https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
69+
70+
* CVE-2022-31091: Change in port should be considered a change in origin
71+
https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
72+
7373
* CVE-2022-31043: Fix failure to strip Authorization header on HTTP downgrade
7474
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
7575

0 commit comments

Comments
 (0)