Skip to content

Commit

Permalink
pySCG: adding prominent CVE for CWE-78 to main readme (#692)
Browse files Browse the repository at this point in the history
* pySCG: adding prominent CVE for CWE-78 to main readme

Signed-off-by: Helge Wehder <helge.wehder@ericsson.com>

* fixed copy and paste mistakes for code examples in readme

Signed-off-by: Helge Wehder <helge.wehder@ericsson.com>

---------

Signed-off-by: Helge Wehder <helge.wehder@ericsson.com>
  • Loading branch information
myteron authored Dec 4, 2024
1 parent a7f2313 commit 40a7c85
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 4 deletions.
3 changes: 0 additions & 3 deletions docs/Secure-Coding-Guide-for-Python/CWE-707/CWE-78/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,6 @@ This scenario demonstrates a potential remote command execution. The `FileOperat
*[noncompliant01.py](noncompliant01.py):*

```python
""" Non-compliant Code Example """
# SPDX-FileCopyrightText: OpenSSF project contributors
# SPDX-License-Identifier: MIT
""" Non-compliant Code Example """
Expand Down Expand Up @@ -135,8 +134,6 @@ The `compliant01.py` code using the cross-platform compatible pathlib module and
*[compliant01.py](compliant01.py):*

```python
""" Compliant Code Example """

# SPDX-FileCopyrightText: OpenSSF project contributors
# SPDX-License-Identifier: MIT
""" Compliant Code Example """
Expand Down
2 changes: 1 addition & 1 deletion docs/Secure-Coding-Guide-for-Python/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ It is **not production code** and requires code-style or python best practices t

|[CWE-707: Improper Neutralization](https://cwe.mitre.org/data/definitions/707.html)|Prominent CVE|
|:----------------------------------------------------------------|:----|
|[CWE-78: Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection")](CWE-707/CWE-78/README.md)||
|[CWE-78: Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection")](CWE-707/CWE-78/README.md)|[CVE-2024-43804](https://www.cvedetails.com/cve/CVE-2024-43804/),<br/>CVSSv3.1: **8.8**,<br/>EPSS: **00.06** (08.11.2024)|
|[CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')](CWE-707/CWE-89/.)|[CVE-2019-8600](https://www.cvedetails.com/cve/CVE-2019-8600/),<br/>CVSSv3.1: **9.8**,<br/>EPSS: **01.43** (18.02.2024)|
|[CWE-117: Improper Output Neutralization for Logs](CWE-707/CWE-117/.)||
|[CWE-175: Improper Handling of Mixed Encoding](CWE-707/CWE-175/README.md)||
Expand Down

0 comments on commit 40a7c85

Please sign in to comment.