GithubHelp home page GithubHelp logo

jhonnyli / zenview Goto Github PK

View Code? Open in Web Editor NEW
1.0 1.0 0.0 1.71 MB

A personal learning experience in converting Zendesk users and tickets to a digital overview board.

Home Page: https://zenview.azurewebsites.net/

C# 32.30% JavaScript 1.87% CSS 55.85% HTML 9.26% SCSS 0.67% ASP.NET 0.04%
asp-dot-net signalr zendesk

zenview's Introduction

ZenView

Build Status Online Status Online Status

The idea

The server connects to Zendesk via Api and also through webhooks that update tickets status in real-time. To get the real-time experience for the users the server connects to the client via SignalR. Client side updates are handled in React with Redux support.

References

zenview's People

Contributors

dependabot[bot] avatar jhonnyli avatar

Stargazers

 avatar

Watchers

 avatar

zenview's Issues

Add React

For showing and updating the Zendesk tickets

Site crashes when login to zendesk is invalid.

When a user logs into a Zendesk account that is not connected to ZenView then Zendesk responds with a Status 403 (Forbidden) error message. The site does not handle this and crashes.

CVE-2012-6708 Medium Severity Vulnerability detected by WhiteSource

CVE-2012-6708 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.6.4.min.js, jquery-1.6.4.js, jquery.1.6.4.nupkg

jquery-1.6.4.min.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.min.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.min.js

Dependency Hierarchy:

  • jquery-1.6.4.min.js (Vulnerable Library)
jquery-1.6.4.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.js

Dependency Hierarchy:

  • jquery-1.6.4.js (Vulnerable Library)
jquery.1.6.4.nupkg

jQuery is a new kind of JavaScript Library. jQuery is a fast and concise JavaScript Library ...

path: /ZenView/ZenView/ZenView.SignalR/packages.config

Library home page: https://api.nuget.org/packages/jquery.1.6.4.nupkg

Dependency Hierarchy:

  • jquery.1.6.4.nupkg (Vulnerable Library)

Vulnerability Details

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

Publish Date: 2018-01-18

URL: CVE-2012-6708

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2012-6708

Release Date: 2018-01-18

Fix Resolution: 1.9.0


Step up your Open Source Security Game with WhiteSource here

WS-2017-0195 Medium Severity Vulnerability detected by WhiteSource

WS-2017-0195 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.6.4.min.js, jquery-1.6.4.js

jquery-1.6.4.min.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.min.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.min.js

Dependency Hierarchy:

  • jquery-1.6.4.min.js (Vulnerable Library)
jquery-1.6.4.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.js

Dependency Hierarchy:

  • jquery-1.6.4.js (Vulnerable Library)

Vulnerability Details

In v2.2.4 and previous, a lowercasing logic was used on the attribute names and was removed in v3.0.0.
Because of this, boolean attributes whose names were not all lowercase cause infinite recursion, and will exceed the stack call limit.

Publish Date: 2017-04-15

URL: WS-2017-0195

CVSS 2 Score Details (5.3)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: jquery/jquery@d12e13d

Release Date: 2016-05-29

Fix Resolution: Replace or update the following files: attr.js, attributes.js


Step up your Open Source Security Game with WhiteSource here

Action Required: Fix Mend Configuration File - .whitesource

There is an error with this repository's Mend configuration file that needs to be fixed. As a precaution, scans will stop until it is resolved.

Errors:

  • Failed to parse configuration file: JhonnyLi/ZenView/.whitesource: failed to parse JSON content

CVE-2015-9251 Medium Severity Vulnerability detected by WhiteSource

CVE-2015-9251 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.6.4.min.js, jquery-1.6.4.js

jquery-1.6.4.min.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.min.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.min.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.min.js

Dependency Hierarchy:

  • jquery-1.6.4.min.js (Vulnerable Library)
jquery-1.6.4.js

JavaScript library for DOM operations

path: /ZenView/ZenView/ZenView/Scripts/Vendor/SignalR/jquery-1.6.4.js,/ZenView/ZenView/ZenView.Core/Scripts/jquery-1.6.4.js

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.6.4/jquery.js

Dependency Hierarchy:

  • jquery-1.6.4.js (Vulnerable Library)

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Publish Date: 2018-01-18

URL: CVE-2015-9251

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: jquery/jquery@b078a62#diff-bee4304906ea68bebadfc11be4368419

Release Date: 2015-10-12

Fix Resolution: Replace or update the following files: script.js, ajax.js, ajax.js


Step up your Open Source Security Game with WhiteSource here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.