You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Issue-Label Bot is automatically applying the label bug to this issue, with a confidence of 0.91. Please mark this comment with 👍 or 👎 to give our bot feedback!
mend-bolt-for-githubbot
changed the title
WS-2018-0028 (Medium) detected in paragonie/random_compat-v1.4.3
WS-2018-0028 (High) detected in paragonie/random_compat-v1.4.3
Oct 6, 2020
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
mend-bolt-for-githubbot
changed the title
WS-2018-0028 (High) detected in paragonie/random_compat-v1.4.3
WS-2018-0028 (High) detected in paragonie/random_compat-v1.4.3 - autoclosed
Oct 25, 2020
WS-2018-0028 - High Severity Vulnerability
PHP 5.x support for random_bytes() and random_int()
Dependency Hierarchy:
Found in HEAD commit: a68ef33093518f30b58ce6afc7b54944a697f707
Found in base branch: master
The random_compat (before 2.0.0) uses the RAND_pseudo_bytes() API which has been marked as deprecated and by the OpenSSL team.
Publish Date: 2016-03-17
URL: WS-2018-0028
Base Score Metrics:
Type: Upgrade version
Origin: paragonie/random_compat#96
Release Date: 2018-01-07
Fix Resolution: 2.0.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: