Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update copyright in rb, js, yaml, html, md, txt, css, c, nasm, java, php and as files #3251

Merged
merged 2 commits into from
Dec 26, 2024

Second round of Copyright date update

b5b1925
Select commit
Loading
Failed to load commit list.
Merged

Update copyright in rb, js, yaml, html, md, txt, css, c, nasm, java, php and as files #3251

Second round of Copyright date update
b5b1925
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Dec 25, 2024 in 4s

443 new alerts including 1 critical severity security vulnerability

New alerts in code changed by this pull request

Security Alerts:

  • 1 critical
  • 38 high
  • 3 medium

Other Alerts:

  • 236 warnings
  • 165 notes

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 177 in extensions/social_engineering/web_cloner/web_cloner.rb

See this annotation in the file changed.

Code scanning / CodeQL

Request without certificate validation High

This request may run without certificate validation because
validation is disabled
.

Check failure on line 30 in modules/social_engineering/edge_wscript_wsh_injection/module.rb

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This does not escape backslash characters in the input.

Check failure on line 50 in spec/beef/api/auth_rate_spec.rb

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

This hardcoded value is
used as credentials
.

Check failure on line 66 in tools/csrf_to_beef/lib/module.rb

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This does not escape backslash characters in the input.

Check failure on line 80 in tools/csrf_to_beef/lib/module.rb

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This does not escape backslash characters in the input.

Check failure on line 80 in tools/csrf_to_beef/lib/module.rb

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This does not escape backslash characters in the input.

Check warning on line 42 in core/main/client/mitb.js

See this annotation in the file changed.

Code scanning / CodeQL

Client-side URL redirect Medium

Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.

Check warning on line 195 in core/main/client/mitb.js

See this annotation in the file changed.

Code scanning / CodeQL

Client-side URL redirect Medium

Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.

Check notice on line 52 in modules/browser/browser_fingerprinting/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Semicolon insertion Note

Avoid automated semicolon insertion (91% of all statements in
the enclosing function
have an explicit semicolon).

Check notice on line 56 in modules/browser/browser_fingerprinting/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Call to eval-like DOM function Note

Avoid using functions that evaluate strings as code.

Check warning on line 21 in modules/browser/detect_evernote_clipper/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable iframeresult is used like a local variable, but is missing a declaration.

Check warning on line 9 in modules/browser/detect_extensions/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable chrome_extensions is used like a local variable, but is missing a declaration.

Check warning on line 14 in modules/browser/detect_unsafe_activex/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless assignment to local variable Warning

The value assigned to test here is unused.

Check notice on line 427 in modules/browser/get_visited_domains/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Unused variable, import, function or class Note

Unused variable loaded.

Check warning on line 435 in modules/browser/get_visited_domains/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing origin verification in `postMessage` handler Medium

Postmessage handler has no origin check.

Check warning on line 438 in modules/browser/get_visited_domains/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Deleting non-property Warning

Only properties should be deleted.

Check warning on line 442 in modules/browser/get_visited_domains/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Deleting non-property Warning

Only properties should be deleted.

Check warning on line 527 in modules/browser/get_visited_domains/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable vp is used like a local variable, but is missing a declaration.

Check failure on line 10 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '\.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 10 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '\.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check notice on line 12 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Unused variable, import, function or class Note

Unused variable urls.

Check notice on line 53 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Semicolon insertion Note

Avoid automated semicolon insertion (90% of all statements in
the enclosing function
have an explicit semicolon).

Check warning on line 60 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable key is used like a local variable, but is missing a declaration.

Check warning on line 61 in modules/browser/hooked_origin/ajax_fingerprint/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable name is used like a local variable, but is missing a declaration.

Check warning on line 8 in modules/browser/hooked_origin/apache_tomcat_examples_cookie_disclosure/command.js

See this annotation in the file changed.

Code scanning / CodeQL

Missing variable declaration Warning

Variable request_header_servlet_path is used like a local variable, but is missing a declaration.