Go module
github.com/CoryKelly/Admin_App
check_circle
arrow_drop_downv0.0.0-20210727214240-5db0057e5176
Default versionSecurity Advisories
14
In the dependencies
Similar advisories
Authorization bypass in github.com/dgrijalva/jwt-go
7.5 HIGH·GHSA-w73w-5m7g-f7qc
Similar advisories
golang.org/x/crypto/ssh Denial of service via crafted Signer
7.5 HIGH·GHSA-8c26-wmh5-6g9v
Similar advisories
Path traversal in github.com/valyala/fasthttp
7.5 HIGH·GHSA-fx95-883v-4q4h
Similar advisories
golang.org/x/sys/unix has Incorrect privilege reporting in syscall
5.3 MODERATE·GHSA-p782-xgp4-8hr8
Similar advisories
x/crypto/ssh vulnerable to panic via malformed packets
7.5 HIGH·GHSA-gwc9-m7rh-j2ww
Similar advisories
Fiber unauthorized access vulnerability in `ctx.IsFromLocal()`
5.3 MODERATE·GHSA-3q5p-3558-364f
Similar advisories
CSRF Token Reuse Vulnerability
9.6 CRITICAL·GHSA-94w9-97p3-p368
Similar advisories
Go Fiber CSRF Token Validation Vulnerability
8.8 HIGH·GHSA-mv73-f69x-444p
Similar advisories
Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin
5.9 MODERATE·GHSA-45x7-px36-x8w8
Similar advisories
Fiber has Insecure CORS Configuration, Allowing Wildcard Origin with Credentials
9.4 CRITICAL·GHSA-fmg4-x8pw-hjhg
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
github.com/gofiber/fiber/v2 vulnerable to Origin Validation Error
5.9 MODERATE·GHSA-927h-x4qj-r242
Dependents
This package has no known dependents.
Package metadata as of .
Links
- Origin
- Repo
Projects
corykelly/admin_app
GitHub
Admin App using Vue 3 and Fiber.
call_split 0 forks
star 1 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
1.7/10
Scorecard as of .
Maintained
0/10
Determines if the project is "actively maintained".
Reasoning
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Code-Review
0/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
Found 0/7 approved changesets -- score normalized to 0
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Security-Policy
0/10
Determines if the project has published a security policy.
Reasoning
security policy file not detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
SAST
0/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is not run on all commits -- score normalized to 0
Branch-Protection
0/10
Determines if the default and release branches are protected with GitHub's branch protection settings.
Reasoning
branch protection not enabled on development/release branches
Vulnerabilities
0/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
14 existing vulnerabilities detected
Project metadata as of .