We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checkmarx (SAST): Client_Hardcoded_Domain Security Issue: Read More about Client_Hardcoded_Domain Checkmarx Project: AaronZhouYu/TotallySecureApp Repository URL: https://github.com/AaronZhouYu/TotallySecureApp Branch: main Scan ID: d9fa6dd5-d23b-4436-b75a-41a016305f39
The JavaScript file imported in https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css in /src/main/resources/templates/eb/v1/head.html at line 9 is from a remote domain, which may allow attackers to replace its contents with malicious code.
Result #1: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css: /src/main/resources/templates/eb/v1/head.html[9,31] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #2: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap\-theme.min.css: /src/main/resources/templates/eb/v1/head.html[7,31] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #3: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css: /src/main/resources/templates/eb/v1/head.html[5,31] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #4: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. "https://cdnjs.cloudflare.com/ajax/libs/mathjax/2.7.0/MathJax.js?config=TeX\-AMS\_CHTML": /src/main/resources/templates/eb/v1/head.html[17,43] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #5: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. "https://cdn.rawgit.com/google/code\-prettify/master/loader/run\_prettify.js": /src/main/resources/templates/eb/v1/head.html[15,43] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #6: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js": /src/main/resources/templates/eb/v1/head.html[13,43] Review result in Checkmarx One: Client_Hardcoded_Domain
Result #7: Severity: LOW State: TO_VERIFY Status: RECURRENT Attack Vector:
1. "https://ajax.googleapis.com/ajax/libs/jquery/3.1.1/jquery.min.js": /src/main/resources/templates/eb/v1/head.html[11,43] Review result in Checkmarx One: Client_Hardcoded_Domain
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Checkmarx (SAST): Client_Hardcoded_Domain
Security Issue: Read More about Client_Hardcoded_Domain
Checkmarx Project: AaronZhouYu/TotallySecureApp
Repository URL: https://github.com/AaronZhouYu/TotallySecureApp
Branch: main
Scan ID: d9fa6dd5-d23b-4436-b75a-41a016305f39
The JavaScript file imported in https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css in /src/main/resources/templates/eb/v1/head.html at line 9 is from a remote domain, which may allow attackers to replace its contents with malicious code.
Result #1:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css: /src/main/resources/templates/eb/v1/head.html[9,31]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #2:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap\-theme.min.css: /src/main/resources/templates/eb/v1/head.html[7,31]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #3:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css: /src/main/resources/templates/eb/v1/head.html[5,31]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #4:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. "https://cdnjs.cloudflare.com/ajax/libs/mathjax/2.7.0/MathJax.js?config=TeX\-AMS\_CHTML": /src/main/resources/templates/eb/v1/head.html[17,43]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #5:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. "https://cdn.rawgit.com/google/code\-prettify/master/loader/run\_prettify.js": /src/main/resources/templates/eb/v1/head.html[15,43]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #6:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js": /src/main/resources/templates/eb/v1/head.html[13,43]
Review result in Checkmarx One: Client_Hardcoded_Domain
Result #7:
Severity: LOW
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. "https://ajax.googleapis.com/ajax/libs/jquery/3.1.1/jquery.min.js": /src/main/resources/templates/eb/v1/head.html[11,43]
Review result in Checkmarx One: Client_Hardcoded_Domain
The text was updated successfully, but these errors were encountered: