Skip to content

[GHSA-cj8w-v588-p8wx] pf4j vulnerable to remote code execution via expandIfZip method in the extract function #2463

[GHSA-cj8w-v588-p8wx] pf4j vulnerable to remote code execution via expandIfZip method in the extract function

[GHSA-cj8w-v588-p8wx] pf4j vulnerable to remote code execution via expandIfZip method in the extract function #2463

Triggered via pull request October 6, 2023 18:19
Status Success
Total duration 1m 14s
Artifacts
This run and associated checks have been archived and are scheduled for deletion. Learn more about checks retention

delete_staging_and_head_branches.yaml

on: pull_request_target
delete-staging-and-head-branches
1m 2s
delete-staging-and-head-branches
Fit to window
Zoom out
Zoom in

Annotations

1 warning
delete-staging-and-head-branches
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/