View Code? Open in Web Editor
NEW
Collection of tools that I have created and I usually use.
Home Page: https://alvaro.ga/en/projects/tools/
License: GNU General Public License v3.0
Shell 14.91%
CSS 40.99%
HTML 15.26%
Makefile 0.08%
C 18.50%
JavaScript 7.08%
Dockerfile 1.22%
Rust 1.95%
tools's Introduction
Hi there, I'm Álvaro Galisteo
I am a DevOps engineer that works hard to make software and AI run smoothly, as if by magic.
- 💼 Working as a Site Reliability Engineer at wefox
- ✈️ Creator and main developer of Totepass, a trip planning application
- 🎓 Graduated in Computer Engineering at Universidad Carlos III de Madrid
- 💻 Mainly interested in DevOps, SRE and Artificial Inteligence.
- 🐧 Linux and open-source enthusiast
- 🌱 Making a lot of small projects in my spare time
tools's People
Stargazers
Watchers
tools's Issues
CVE-2023-2251 - High Severity Vulnerability
Vulnerable Library - yaml-1.10.2.tgz
JavaScript parser and stringifier for YAML
Library home page: https://registry.npmjs.org/yaml/-/yaml-1.10.2.tgz
Path to dependency file: /docker-composer/package.json
Path to vulnerable library: /docker-composer/node_modules/yaml/package.json
Dependency Hierarchy:
- ❌ yaml-1.10.2.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Uncaught Exception in GitHub repository eemeli/yaml prior to 2.2.2.
Publish Date: 2023-04-24
URL: CVE-2023-2251
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-f9xv-q969-pqx4
Release Date: 2023-04-24
Fix Resolution: 2.0.0-0
Step up your Open Source Security Game with Mend here
WS-2023-0223 - Critical Severity Vulnerability
Vulnerable Library - atty-0.2.14.crate
A simple interface for querying atty
Library home page: https://crates.io/api/v1/crates/atty/0.2.14/download
Dependency Hierarchy:
- structopt-0.3.21.crate (Root Library)
- clap-2.33.3.crate
- ❌ atty-0.2.14.crate (Vulnerable Library)
Found in base branch: master
Vulnerability Details
atty potential unaligned read
Publish Date: 2023-06-30
URL: WS-2023-0223
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Step up your Open Source Security Game with Mend here