[Checkmarx] JavaScript_Server_Side_Vulnerabilities - Use_Of_Hardcoded_Password : 1699607973
github-actions opened this issue · comments
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
621c37f
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 621c37f
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
621c37f
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 621c37f
Comments
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000069
LOC: 5109
Files Scanned: 14
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000069&projectid=6
Scan Comment: git master@621c37f278543303f6c7f407d81698b8a4c09ce3
Scan Type: 00h:01m:09s
Scan Start Date: Tue Jun 16 2020 11:24:04 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:09s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000069
Result State: 0
Result Severity: Low
Result Status: New
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
54d0fe8
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 54d0fe8
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
54d0fe8
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 54d0fe8
Comments
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000070
LOC: 5109
Files Scanned: 14
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000070&projectid=6
Scan Comment: Attempt to perform scan on 6/16/2020 11:28:15 AM - No code changes were detected; git master@621c37f278543303f6c7f407d81698b8a4c09ce3
Scan Type: 00h:00m:00s
Scan Start Date: Tue Jun 16 2020 11:28:15 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000070
Result State: 0
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
e287e6b
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in e287e6b
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
e287e6b
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in e287e6b
Comments
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000071
LOC: 5109
Files Scanned: 14
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000071&projectid=6
Scan Comment: Attempt to perform scan on 6/16/2020 12:55:17 PM - No code changes were detected; Attempt to perform scan on 6/16/2020 11:28:15 AM - No code changes were detected; git master@621c37f278543303f6c7f407d81698b8a4c09ce3
Scan Type: 00h:00m:00s
Scan Start Date: Tue Jun 16 2020 12:55:17 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000071
Result State: 0
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
2ffda0b
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 2ffda0b
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
2ffda0b
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 2ffda0b
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000072
LOC: 5109
Files Scanned: 14
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000072&projectid=6
Scan Comment: git master@2ffda0b5ab60a01893ad7eb6feb120c3fa8c8be8
Scan Type: 00h:01m:06s
Scan Start Date: Tue Jun 16 2020 13:04:26 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:06s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000072
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
9f52fc5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 9f52fc5
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
9f52fc5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 9f52fc5
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000073
LOC: 5109
Files Scanned: 14
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000073&projectid=6
Scan Comment: Attempt to perform scan on 6/16/2020 3:02:01 PM - No code changes were detected; git master@2ffda0b5ab60a01893ad7eb6feb120c3fa8c8be8
Scan Type: 00h:00m:00s
Scan Start Date: Tue Jun 16 2020 15:02:01 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000073
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
837e6d5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 837e6d5
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
837e6d5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 837e6d5
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000074
LOC: 5458
Files Scanned: 17
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000074&projectid=6
Scan Comment: git master@837e6d5175a829f55c276018e472f6cf5e86597d
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 16 2020 23:39:17 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000074
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
0cb0fb5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 0cb0fb5
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
0cb0fb5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 0cb0fb5
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000075
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000075&projectid=6
Scan Comment: git master@0cb0fb5ab4984ac13ef6343576d94e35cb22996d
Scan Type: 00h:01m:11s
Scan Start Date: Tue Jun 16 2020 23:54:23 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:11s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000075
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
90a727e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 90a727e
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
90a727e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 90a727e
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000076
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000076&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 12:03:35 AM - No code changes were detected; git master@0cb0fb5ab4984ac13ef6343576d94e35cb22996d
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 00:03:35 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000076
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ae590d1
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ae590d1
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ae590d1
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ae590d1
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000077
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000077&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 12:23:55 AM - No code changes were detected; Attempt to perform scan on 6/17/2020 12:03:35 AM - No code changes were detected; git master@0cb0fb5ab4984ac13ef6343576d94e35cb22996d
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 00:23:55 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000077
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
3067f84
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 3067f84
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
3067f84
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 3067f84
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000078
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000078&projectid=6
Scan Comment: git master@3067f84263aa5022bcdced34b3627e4a76a5e67c
Scan Type: 00h:01m:19s
Scan Start Date: Wed Jun 17 2020 00:28:35 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:19s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000078
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
6ff22f7
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 6ff22f7
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
6ff22f7
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 6ff22f7
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000079
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000079&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 12:51:58 AM - No code changes were detected; git master@3067f84263aa5022bcdced34b3627e4a76a5e67c
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 00:51:58 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000079
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
8a1a745
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 8a1a745
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
8a1a745
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 8a1a745
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000080
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000080&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 8:32:30 AM - No code changes were detected; Attempt to perform scan on 6/17/2020 12:51:58 AM - No code changes were detected; git master@3067f84263aa5022bcdced34b3627e4a76a5e67c
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 08:32:30 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000080
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
bf96600
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in bf96600
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
bf96600
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in bf96600
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000086
LOC: 5456
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000086&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 8:05:29 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 8:32:30 AM - No code changes were detected; Attempt to perform scan on 6/17/2020 12:51:58 AM - No code changes were detected; git master@3067f84263aa5022bcdced34b3627e4a76a5e67c
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 20:05:29 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000086
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
f10add5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in f10add5
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
f10add5
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in f10add5
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000087
LOC: 7785
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000087&projectid=6
Scan Comment: git master@f10add5ac1d77a5e58704be089592fd1bd8d86c3
Scan Type: 00h:01m:08s
Scan Start Date: Wed Jun 17 2020 20:47:01 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:08s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000087
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
089ec58
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 089ec58
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
089ec58
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 089ec58
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000088
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000088&projectid=6
Scan Comment: git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:01m:15s
Scan Start Date: Wed Jun 17 2020 20:52:33 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:15s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000088
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
907d048
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 907d048
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
907d048
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 907d048
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000089
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000089&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 21:03:31 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000089
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
92ae016
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 92ae016
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
92ae016
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 92ae016
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000090
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000090&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 21:05:32 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000090
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
1c03b7f
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 1c03b7f
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
1c03b7f
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 1c03b7f
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000091
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000091&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 21:58:12 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000091
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
812b663
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 812b663
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
812b663
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 812b663
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000092
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000092&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:03:52 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000092
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ad6d56e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ad6d56e
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ad6d56e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ad6d56e
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000093
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000093&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:15:14 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000093
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
f95e008
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in f95e008
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
f95e008
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in f95e008
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000094
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000094&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:18:11 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:18:11 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000094
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
9af92e3
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 9af92e3
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
9af92e3
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 9af92e3
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000095
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000095&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:22:54 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:18:11 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:22:54 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000095
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
54271de
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 54271de
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
54271de
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 54271de
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000096
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000096&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:25:33 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:22:54 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:18:11 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:25:33 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000096
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
3d11deb
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 3d11deb
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
3d11deb
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in 3d11deb
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000097
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000097&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:39:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:25:33 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:22:54 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:18:11 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:39:52 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000097
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ab571da
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ab571da
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
ab571da
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in ab571da
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000098
LOC: 7788
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000098&projectid=6
Scan Comment: Attempt to perform scan on 6/17/2020 10:44:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:39:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:25:33 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:22:54 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:18:11 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:15:14 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 10:03:52 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:58:12 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:05:32 PM - No code changes were detected; Attempt to perform scan on 6/17/2020 9:03:31 PM - No code changes were detected; git master@089ec58769908e655ffcedb4ea15e2ef012b4266
Scan Type: 00h:00m:00s
Scan Start Date: Wed Jun 17 2020 22:44:14 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000098
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
bb9101e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in bb9101e
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
bb9101e
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in bb9101e
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000099
LOC: 7791
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000099&projectid=6
Scan Comment: git master@bb9101ed82fa9485fe5c6677f5608c3a8c077f25
Scan Type: 00h:01m:09s
Scan Start Date: Thu Jun 18 2020 00:47:09 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:09s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000099
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
dcdc481
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in dcdc481
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
dcdc481
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in dcdc481
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000100
LOC: 7828
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000100&projectid=6
Scan Comment: git master@dcdc481650f55a150959def1a3ac895a0e57eb93
Scan Type: 00h:01m:15s
Scan Start Date: Thu Jun 18 2020 01:20:24 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:01m:15s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000100
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Low - Use_Of_Hardcoded_Password
0 Node - Line 227 - "cxScaPassword"
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
aa31a49
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in aa31a49
1 Node - Line 227 - CX_SCA_PASSWORD
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228
in
aa31a49
checkmarx-github-action/src/github/inputs.js
Lines 226 to 228 in aa31a49
Comments
Miguel Freitas checkmarx-github-action-master, [Tuesday, June 16, 2020 1:01:29 PM]: Changed status to Not Exploitable
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000134
LOC: 7828
Files Scanned: 15
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000134&projectid=6
Scan Comment: Attempt to perform scan on 6/23/2020 7:05:30 PM - No code changes were detected; git master@dcdc481650f55a150959def1a3ac895a0e57eb93
Scan Type: 00h:00m:00s
Scan Start Date: Tue Jun 23 2020 19:05:30 GMT+0000 (Coordinated Universal Time)
Scan Time: 00h:00m:00s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0000 (Coordinated Universal Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 1699607973
Path ID: 3
Result ID: 1000134
Result State: 1
Result Severity: Low
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html