Chore: java 17 and general cleanup #1916
2 configurations not found
Warning: Code scanning may not have found all the alerts introduced by this pull request, because 2 configurations present on refs/heads/main
were not found:
Actions workflow (codeql-analysis.yml
)
- ❓
.github/workflows/codeql-analysis.yml:analyze/language:java
- ❓
.github/workflows/codeql-analysis.yml:analyze/language:javascript
New alerts in code changed by this pull request
Security Alerts:
- 26 high
- 1 medium
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Code scanning / CodeQL
Incomplete multi-character sanitization High library
, which may cause an HTML element injection vulnerability.Code scanning / CodeQL
Incomplete string escaping or encoding High library
Code scanning / CodeQL
Incomplete multi-character sanitization High library
, which may cause an HTML element injection vulnerability.Code scanning / CodeQL
Incomplete multi-character sanitization High library
, which may cause an HTML element injection vulnerability.Code scanning / CodeQL
Incomplete multi-character sanitization High library
, which may cause an HTML element injection vulnerability.Code scanning / CodeQL
Incomplete multi-character sanitization High library
, which may cause an HTML element injection vulnerability.
Check failure on line 71848 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 74470 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete string escaping or encoding High
Check failure on line 75709 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 75965 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 84241 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 84322 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 87798 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete string escaping or encoding High
Check failure on line 87835 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete string escaping or encoding High
Check failure on line 87896 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 87899 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 88247 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check failure on line 88246 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
Incomplete multi-character sanitization High
, which may cause an HTML element injection vulnerability.
Check warning on line 95754 in studio/src/main/resources/static/components/DataTables/datatables.js
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
is reinterpreted as HTML without escaping meta-characters.
Check failure on line 632 in server/src/main/java/com/arcadedb/server/ArcadeDBServer.java
Code scanning / CodeQL
Insecure randomness High
.
Check failure on line 651 in server/src/main/java/com/arcadedb/server/ArcadeDBServer.java
Code scanning / CodeQL
Insecure randomness High
.
Check failure on line 249 in server/src/main/java/com/arcadedb/server/http/HttpServer.java
Code scanning / CodeQL
Insecure randomness High
.
Check failure on line 253 in server/src/main/java/com/arcadedb/server/http/HttpServer.java
Code scanning / CodeQL
Insecure randomness High
.
Check failure on line 249 in server/src/main/java/com/arcadedb/server/security/ServerSecurity.java
Code scanning / CodeQL
Insecure randomness High
.
Check failure on line 266 in server/src/main/java/com/arcadedb/server/security/ServerSecurity.java
Code scanning / CodeQL
Insecure randomness High
.