Skip to content

Merge branch '4.15.9+patch-a' into develop

c216919
Select commit
Loading
Failed to load commit list.
Sign in for the full log view
Closed

DO NOT MERGE #8591

Merge branch '4.15.9+patch-a' into develop
c216919
Select commit
Loading
Failed to load commit list.
GitHub Actions / Test Report failed Nov 5, 2025 in 0s

107 tests run, 0 skipped, 12 failed.

Annotations

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.HTTP Header (1)

The content security policy is missing the report-to directive. This was found on URL https://performancetest-qa.processmaker.net

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.HTTP Header (2)

The cookie with the name 'device_id' does not have the flag 'HttpOnly' set. This may leak sensitive information. This was found on URL https://performancetest-qa.processmaker.net.

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.HTTP Header (3)

The Referrer-Policy header is not set for URL https://performancetest-qa.processmaker.net.

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Cross-Site Scripting (XSS) (1)

The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/vendor/processmaker/packages/package-ai/js/webhook.js'. An attacker may be able to inject JavaScript using the the code 'location.href' at line 2:288441 and control its display using the code 'setTimeout' at line 2:34103

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Cross-Site Scripting (XSS) (2)

The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/vendor/processmaker/packages/package-savedsearch/js/addSaveButton.js'. An attacker may be able to inject JavaScript using the the code 'location.href' at line 2:315254 and control its display using the code 'setTimeout' at line 2:230985

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Cross-Site Scripting (XSS) (3)

The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/builds/login/js/app-login.js'. An attacker may be able to inject JavaScript using the the code 'document.cookie' at line 2:12994 and control its display using the code 'setTimeout' at line 2:1267

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Transport Layer Security (TLS/SSL) (1)

The cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is weak.

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Transport Layer Security (TLS/SSL) (2)

The cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 is weak.

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Transport Layer Security (TLS/SSL) (3)

The server is configured to use average ciphers like SEED + 128+256 Bit CBC ciphers (AES, CAMELLIA and ARIA) which are deprecated

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Transport Layer Security (TLS/SSL) (4)

OCSP_stapling is not offered by the server.

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Portscan (1)

Found open port '443/tcp' with service name 'awselb/2.0'

Check failure on line 1 in io

See this annotation in the file changed.

@github-actions github-actions / Test Report

io.Portscan (2)

Found open port '80/tcp' with service name 'awselb/2.0'