View Code? Open in Web Editor
NEW
This project forked from ocadotechnology /aimmo
A Massively Multi-player Online game, where players create Artificially Intelligent programs to play on their behalf.
License: GNU Affero General Public License v3.0
Dockerfile 0.28%
Python 81.95%
Shell 0.34%
CSS 0.01%
HTML 1.31%
JavaScript 16.10%
aimmo's People
Watchers
aimmo's Issues
CVE-2018-16984 - Medium Severity Vulnerability
Vulnerable Libraries - Django-1.8.19-py2.py3-none-any.whl , Django-1.10.8-py2.py3-none-any.whl
Django-1.8.19-py2.py3-none-any.whl
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
path: /aimmo/aimmo_runner,/tmp/git/aimmo/aimmo_runner
Library home page: https://pypi.python.org/packages/96/b9/b4108da1275dc2ac1bba1e87739cb31b3d44339affb83b0e949fb09c2bef/Django-1.8.19-py2.py3-none-any.whl
Dependency Hierarchy:
❌ Django-1.8.19-py2.py3-none-any.whl (Vulnerable Library)
Django-1.10.8-py2.py3-none-any.whl
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
path: /aimmo,/tmp/git/aimmo
Library home page: https://pypi.python.org/packages/bb/9f/2c20639ac635a83123ddffd91ba15001cb0d04e74fbb08f31fb57e490dab/Django-1.10.8-py2.py3-none-any.whl
Dependency Hierarchy:
❌ Django-1.10.8-py2.py3-none-any.whl (Vulnerable Library)
Vulnerability Details
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Publish Date: 2018-10-02
URL: CVE-2018-16984
CVSS 3 Score Details (4.9 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: High
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1041749
Fix Resolution: The vendor has issued a fix (2.1.2).
The vendor advisory is available at:
https://www.djangoproject.com/weblog/2018/oct/01/security-release/
Step up your Open Source Security Game with WhiteSource here
WS-2019-0019 - Medium Severity Vulnerability
Vulnerable Library - braces-1.8.5.tgz
Fastest brace expansion for node.js, with the most complete support for the Bash 4.3 braces specification.
path: /tmp/git/aimmo/game_frontend/node_modules/jest/node_modules/braces/package.json
Library home page: https://registry.npmjs.org/braces/-/braces-1.8.5.tgz
Dependency Hierarchy:
babel-jest-23.6.0.tgz (Root Library)
babel-plugin-istanbul-4.1.6.tgz
test-exclude-4.2.3.tgz
micromatch-2.3.11.tgz
❌ braces-1.8.5.tgz (Vulnerable Library)
Vulnerability Details
Version of braces prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
Publish Date: 2019-02-21
URL: WS-2019-0019
CVSS 2 Score Details (5.0 )
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/786
Release Date: 2019-02-21
Fix Resolution: 2.3.1
Step up your Open Source Security Game with WhiteSource here
CVE-2015-9251 - Medium Severity Vulnerability
Vulnerable Library - jquery-1.11.3.min.js
JavaScript library for DOM operations
path: /aimmo/aimmo/templates/players/base.html
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.min.js
Dependency Hierarchy:
❌ jquery-1.11.3.min.js (Vulnerable Library)
Vulnerability Details
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Publish Date: 2018-01-18
URL: CVE-2015-9251
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Change files
Origin: jquery/jquery@b078a62 #diff-bee4304906ea68bebadfc11be4368419
Release Date: 2015-10-12
Fix Resolution: Replace or update the following files: script.js, ajax.js, ajax.js
Step up your Open Source Security Game with WhiteSource here