Branch: refs/heads/master
Home:
https://github.com/tribe29/checkmk
Commit: f585adb6d9b69658c2ca5ac5e8a75ca3f358cdb0
https://github.com/tribe29/checkmk/commit/f585adb6d9b69658c2ca5ac5e8a75ca3f…
Author: Moritz Kiemer <moritz.kiemer(a)tribe29.com>
Date: 2021-04-28 (Wed, 28 Apr 2021)
Changed paths:
A .werks/12510
M checks/jolokia_jvm_runtime
M tests/unit/checks/generictests/datasets/jolokia_jvm_runtime.py
Log Message:
-----------
12510 FIX jolokia_jvm_runtime: Uptime was off by a factor of 1000
Change-Id: I64365a572848d552dd722f3a4ee5089b2dc94a2f
Commit: e6c1bbc845501e1bcde7f0592662423c895ce079
https://github.com/tribe29/checkmk/commit/e6c1bbc845501e1bcde7f0592662423c8…
Author: Lars Michelsen <lm(a)tribe29.com>
Date: 2021-04-28 (Wed, 28 Apr 2021)
Changed paths:
A .werks/12826
M cmk/gui/htmllib.py
Log Message:
-----------
12826 SEC Fix reflected XSS using the on page search
The on page search could be used to trigger a reflected XSS attack. It was
possible to execute arbitrary javascript code in the context of the user
clicking on the reset button of the on page search.
Change-Id: Idf7bf390a65b9aec87980f66300433a37f0475a8
Compare:
https://github.com/tribe29/checkmk/compare/00280b0b778f...e6c1bbc84550