Skip to content

Instantly share code, notes, and snippets.

View bobmcwhirter's full-sized avatar

Bob McWhirter bobmcwhirter

View GitHub Profile
graph simulator {
motion-1
core:has-type
device:sensor:OccupancySensor,
cluster:management:basic-information:BasicInformationCluster,
cluster:measurement-sensing:occupancy-sensing:OccupancySensingCluster;
cluster:management:basic-information:BasicInformationCluster
motion-1;
# # Event-Triggered Tasks
#
# This skill shows how to execute tasks when an event occurs.
def setup(ctx):
motion_sensors = ctx.get_occupancy_sensors()
# When motion sensor attributes change, run `event_triggered_task`
ctx.subscribe(motion_sensors, event_triggered_task)
print("Waiting for motion sensor events...")
graph cluster:hvac:thermostat {
/// This cluster provides an interface to the functionality of a thermostat.
ThermostatCluster
core:subclass-of cluster:Cluster;
cluster:attribute
:attribute:supports-heating,
add-license
advisory-hash
advisory-rest
advisory-severity-column
advisory-severity-vulns
advisory-tstamps
advisory-vuln-cvss-and-summary-ish-yeah-buddy
advisory-vuln-relationships
advisory-vuln-severity
advisory-vuln-title-etc
{
"identifier": "CVE-2024-29025",
"title": "Netty HttpPostRequestDecoder can OOM",
"description": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.",
"published": "2024-03-25T20:09:35.156Z",
"modified": "2024-03-25T20:09:35.156Z",
"cwe": "CWE-770",
"average_severity": "medium",
"average_score": 6.5,
"advisories": [
/Users/bob/.cargo/bin/cargo test --color=always --lib vulnerability::service::test::statuses_too --no-fail-fast --manifest-path /Users/bob/repos/trustification/trustify/modules/fundamental/Cargo.toml -- --format=json --exact -Z unstable-options --show-output
Testing started at 2:10 PM ...
Finished `test` profile [unoptimized + debuginfo] target(s) in 0.27s
Running unittests src/lib.rs (target/debug/deps/trustify_module_fundamental-2ed829e0f5f33056)
{
"identifier": "CVE-2024-29025",
"title": "Netty HttpPostRequestDecoder can OOM",
"description": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpDa
warning: external crate `async_std` unused in `migration`: remove the dependency or add `use async_std as _;`
|
= note: requested on the command line with `-W unused-crate-dependencies`
warning: `trustify-migration` (lib) generated 1 warning
warning: external crate `thiserror` unused in `trustify_cvss`: remove the dependency or add `use thiserror as _;`
|
= note: requested on the command line with `-W unused-crate-dependencies`
warning: `trustify-cvss` (lib) generated 1 warning
{
"analysis": {
"pkg:maven/org.postgresql/[email protected]?type=jar": [
{
"vendor": "snyk",
"vulnerable": [
{
"id": "snyk-java-orgpostgresql-3146847",
"severity": [
{
{
"affected": {
"pkg:maven/org.apache.logging.log4j/[email protected]": [
"ghsa-7rjr-3q55-vv33",
"ghsa-8489-44mv-ggj8",
"ghsa-jfh8-c2jp-5v3q",
"ghsa-p6xc-xr62-6r2g",
"cve-2021-44832",
"cwe-94",
"cve-2021-45105",
{
"affected": {
"pkg:maven/org.apache.logging.log4j/[email protected]": [
"ghsa-7rjr-3q55-vv33",
"ghsa-8489-44mv-ggj8",
"ghsa-jfh8-c2jp-5v3q",
"ghsa-p6xc-xr62-6r2g",
"cve-2021-44832",
"cwe-94",
"cve-2021-45105",