fenrick / visiocleanup Goto Github PK
View Code? Open in Web Editor NEWLicense: MIT License
License: MIT License
Use the overloading mechanism instead of the optional parameters.
LoggingLevelSwitch? levelSwitch = null)
Use the overloading mechanism instead of the optional parameters.
LogEventLevel restrictedToMinimumLevel = LevelAlias.Minimum,
Use the overloading mechanism instead of the optional parameters.
LogEventLevel restrictedToMinimumLevel = LevelAlias.Minimum,
Add a 'default' clause to this 'switch' statement.
switch (character)
Roslyn analyzers that spot Bugs, Vulnerabilities and Code Smells in your code. For an even better overall experience, you can use SonarLint for Visual Studio, which is a free extension that can be used standalone or with SonarQube and/or SonarCloud.
Library home page: https://api.nuget.org/packages/sonaranalyzer.csharp.8.50.0.58025.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /packages/sonaranalyzer.csharp/8.50.0.58025/sonaranalyzer.csharp.8.50.0.58025.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
Publish Date: 2022-09-22
URL: CVE-2022-1941
Base Score Metrics:
Type: Upgrade version
Origin: https://cloud.google.com/support/bulletins#GCP-2022-019
Release Date: 2022-09-22
Fix Resolution: Google.Protobuf - 3.18.3,3.19.5,3.20.2,3.21.6;protobuf-python - 3.18.3,3.19.5,3.20.2,4.21.6
Step up your Open Source Security Game with Mend here
Use the overloading mechanism instead of the optional parameters.
string outputTemplate = DefaultOutputTemplate,
Replace this 'switch' statement with 'if' statements to increase readability.
switch (character)
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
Publish Date: 2017-05-12
URL: CVE-2017-0249
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.3.1;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
NetOffice 1.8.1 can't access the DocumentStencils for the active Visio window.
Use the overloading mechanism instead of the optional parameters.
string outputTemplate = DefaultOutputTemplate,
Refactor the code to remove this use of 'GC.Collect'.
GC.Collect();
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
Publish Date: 2017-05-12
URL: CVE-2017-0256
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-0256
Release Date: 2017-05-12
Fix Resolution: Microsoft.AspNetCore.Mvc.ApiExplorer - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Abstractions - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.1.3,1.0.4;System.Net.Http - 4.1.2,4.3.2;Microsoft.AspNetCore.Mvc.Razor - 1.1.3,1.0.4;System.Net.Http.WinHttpHandler - 4.0.2,4.3.0-preview1-24530-04;System.Net.Security - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;System.Text.Encodings.Web - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Razor.Host - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3;System.Net.WebSockets.Client - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
Roslyn analyzers that spot Bugs, Vulnerabilities and Code Smells in your code. For an even better overall experience, you can use SonarLint for Visual Studio, which is a free extension that can be used standalone or with SonarQube and/or SonarCloud.
Library home page: https://api.nuget.org/packages/sonaranalyzer.csharp.8.42.0.51121.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /packages/sonaranalyzer.csharp/8.42.0.51121/sonaranalyzer.csharp.8.42.0.51121.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Publish Date: 2022-01-26
URL: CVE-2021-22570
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-77rm-9x9h-xj3g
Release Date: 2022-01-26
Fix Resolution: Google.Protobuf - 3.15.0
Step up your Open Source Security Game with Mend here
looping logic when placing shapes when loading from excel. appears to be moving them incorrectly.
This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.
These updates are currently rate-limited. Click on a checkbox below to force their creation now.
Microsoft.Extensions.Configuration
, Microsoft.Extensions.DependencyInjection
, Microsoft.Extensions.Hosting
, Microsoft.Extensions.Logging
)These updates have all been created already. Click a checkbox below to force a retry/rebase of any.
.github/workflows/build.yml
actions/setup-java v3.4.1
actions/checkout v3
actions/setup-dotnet v2
microsoft/setup-msbuild v1.0.3
actions/cache v3
actions/cache v3
actions/cache v3
windows 2022
Serilog.Sinks.RichTextWinForm/Serilog.Sinks.RichTextWinForm.csproj
Serilog 2.12.0
JetBrains.Annotations 2022.3.1
SerilogAnalyzer 0.15.0
GCop.All.Common 2.8.0
StyleCop.Analyzers 1.1.118
SonarAnalyzer.CSharp 8.50.0.58025
AsyncFixer 1.6.0
Microsoft.VisualStudio.Threading.Analyzers 17.4.27
Meziantou.Analyzer 1.0.757
VisioCleanup.Core/VisioCleanup.Core.csproj
Serilog 2.12.0
Microsoft.Extensions.Hosting 7.0.0
Microsoft.Data.SqlClient 5.0.1
GCop.All.Common 2.8.0
StyleCop.Analyzers 1.1.118
SonarAnalyzer.CSharp 8.50.0.58025
AsyncFixer 1.6.0
Microsoft.VisualStudio.Threading.Analyzers 17.4.27
Meziantou.Analyzer 1.0.757
VisioCleanup.UI/VisioCleanup.UI.csproj
Microsoft.Extensions.Logging 7.0.0
Microsoft.Extensions.Hosting 7.0.0
Microsoft.Extensions.DependencyInjection 7.0.0
Microsoft.Extensions.Configuration 7.0.0
Serilog.Settings.Configuration 3.4.0
Serilog.Extensions.Hosting 5.0.1
Serilog.Enrichers.Thread 3.1.0
GCop.All.Common 2.8.0
StyleCop.Analyzers 1.1.118
SonarAnalyzer.CSharp 8.50.0.58025
OswaldTechnologies.Extensions.Hosting.WindowsFormsLifetime 1.0.2
AsyncFixer 1.6.0
Microsoft.VisualStudio.Threading.Analyzers 17.4.27
Meziantou.Analyzer 1.0.757
Refactor 'GetHashCode' to not reference mutable fields.
public override int GetHashCode() => HashCode.Combine(this.Foreground, this.Background);
Implement 'IEquatable<T>' in value type 'ThemedValueFormatterState'.
internal struct ThemedValueFormatterState
Data storage logic should be seperate from servicing logic.
Use the overloading mechanism instead of the optional parameters.
LoggingLevelSwitch? levelSwitch = null)
Rename the parameter 'visualChanges' so that it does not duplicate the method name.
public void VisualChanges(bool visualChanges)
Either merge this case with the identical one on line 51 or change one of the implementations.
default:
Rename the parameter 'visualChanges' so that it does not duplicate the method name.
void VisualChanges(bool visualChanges);
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
Publish Date: 2017-05-12
URL: CVE-2017-0247
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.5.4;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
Make this field 'private' and encapsulate it in a 'public' property.
public Color? Background;
Provides the System.Text.RegularExpressions.Regex class, an implementation of a regular expression e...
Library home page: https://api.nuget.org/packages/system.text.regularexpressions.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.regularexpressions/4.3.0/system.text.regularexpressions.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.
Mend Note: After conducting further research, Mend has determined that CVE-2019-0820 only affects environments with versions 4.3.0 and 4.3.1 only on netcore50 environment of system.text.regularexpressions.nupkg.
Publish Date: 2019-05-16
URL: CVE-2019-0820
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-cmhx-cq75-c4mj
Release Date: 2019-05-16
Fix Resolution: System.Text.RegularExpressions - 4.3.1
Step up your Open Source Security Game with Mend here
Too many log events in RichTextWinForm logger
Use the overloading mechanism instead of the optional parameters.
IFormatProvider? formatProvider = null,
Add shapes from database or excel to Visio diagram shapes.
Add the ability to sort Visio shapes after loading.
Remove this commented out code.
// srcStream[(i * srcStreamFields) + srcStreamTracker++] = Convert.ToInt16(item["sheetID"]);
Use the overloading mechanism instead of the optional parameters.
IFormatProvider? formatProvider = null,
Remove this parameter 'diagramShape', whose value is ignored in the method.
private DiagramShape? FindClosestOverlap(DiagramShape diagramShape)
Allow a separate horizontal and vertical spacing for parent then for individual shapes.
Rename the parameter 'format' so that it does not duplicate the method name.
public static string Format(string value, string? format = null)
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
Publish Date: 2018-10-10
URL: CVE-2018-8292
Base Score Metrics:
Type: Upgrade version
Release Date: 2018-10-10
Fix Resolution: System.Net.Http - 4.3.4;Microsoft.PowerShell.Commands.Utility - 6.1.0-rc.1
Step up your Open Source Security Game with Mend here
Either merge this branch with the identical one on line 483 or change one of the implementations.
{
Rename the parameter 'format' so that it does not duplicate the method name.
public static string Format(string value, string? format = null)
Make this field 'private' and encapsulate it in a 'public' property.
public Color? Foreground;
Add the missing 'else' clause.
Implement 'IEquatable<T>' in value type 'StyleReset'.
internal readonly struct StyleReset : IDisposable
Remove this commented out code.
Rename the parameter 'format' so that it does not duplicate the method name.
public void Format(LogEventPropertyValue value, RichTextBox output, string format, bool literalTopLevel = false)
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /VisioCleanup.Core/VisioCleanup.Core.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 9816da4bc65c6742400da6a7700ddd001de358f8
Found in base branch: main
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
Publish Date: 2017-05-12
URL: CVE-2017-0248
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1, 4.3.1;System.Net.Http - 4.1.2, 4.3.2;System.Net.Http.WinHttpHandler - 4.0.2, 4.3.1;System.Net.Security - 4.0.1, 4.3.1;System.Net.WebSockets.Client - 4.0.1, 4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4, 1.1.3
Step up your Open Source Security Game with Mend here
Migrate all non-Windows code into a .net core library for reuse.
Allow for displaying dataset as it is being loaded into memory.
Rename the parameter 'format' so that it does not duplicate the method name.
public void Format(LogEventPropertyValue value, TextWriter output, string format, bool literalTopLevel = false)
Use the overloading mechanism instead of the optional parameters.
RichTextTheme? theme = null,
Refactor the code to remove this use of 'GC.Collect'.
GC.Collect();
Migrate serilog rtf and list into seperate project.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.