Branch: refs/heads/2.0.0
Home:
https://github.com/tribe29/checkmk
Commit: def050e3454496bb52bf1d493bf432f4178bdbe8
https://github.com/tribe29/checkmk/commit/def050e3454496bb52bf1d493bf432f41…
Author: Moritz Kiemer <moritz.kiemer(a)tribe29.com>
Date: 2021-04-28 (Wed, 28 Apr 2021)
Changed paths:
A .werks/12510
M checks/jolokia_jvm_runtime
M tests/unit/checks/generictests/datasets/jolokia_jvm_runtime.py
Log Message:
-----------
12510 FIX jolokia_jvm_runtime: Uptime was off by a factor of 1000
Change-Id: I64365a572848d552dd722f3a4ee5089b2dc94a2f
Commit: f25f9fdaa92f396d73abd8c812d6dd6a7ef75c1f
https://github.com/tribe29/checkmk/commit/f25f9fdaa92f396d73abd8c812d6dd6a7…
Author: Lars Michelsen <lm(a)tribe29.com>
Date: 2021-04-28 (Wed, 28 Apr 2021)
Changed paths:
A .werks/12826
M cmk/gui/htmllib.py
Log Message:
-----------
12826 SEC Fix reflected XSS using the on page search
The on page search could be used to trigger a reflected XSS attack. It was
possible to execute arbitrary javascript code in the context of the user
clicking on the reset button of the on page search.
Change-Id: Idf7bf390a65b9aec87980f66300433a37f0475a8
Compare:
https://github.com/tribe29/checkmk/compare/9dfc0588278f...f25f9fdaa92f