@stordata/vsphere-soapify 1.0.20250624140830 → 1.0.20250722140755

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -55,7 +55,7 @@
55
55
  "vendor": {
56
56
  "name": "GitLab"
57
57
  },
58
- "version": "6.3.2"
58
+ "version": "6.5.0"
59
59
  },
60
60
  "scanner": {
61
61
  "id": "semgrep",
@@ -64,7 +64,7 @@
64
64
  "vendor": {
65
65
  "name": "GitLab"
66
66
  },
67
- "version": "1.110.0"
67
+ "version": "1.118.0"
68
68
  },
69
69
  "primary_identifiers": [
70
70
  {
@@ -620,12 +620,14 @@
620
620
  {
621
621
  "type": "semgrep_id",
622
622
  "name": "eslint.detect-buffer-noassert-read",
623
- "value": "eslint.detect-buffer-noassert-read"
623
+ "value": "eslint.detect-buffer-noassert-read",
624
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-buffer-noassert.js"
624
625
  },
625
626
  {
626
627
  "type": "semgrep_id",
627
628
  "name": "eslint.detect-buffer-noassert-write",
628
- "value": "eslint.detect-buffer-noassert-write"
629
+ "value": "eslint.detect-buffer-noassert-write",
630
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-buffer-noassert.js"
629
631
  },
630
632
  {
631
633
  "type": "semgrep_id",
@@ -635,12 +637,14 @@
635
637
  {
636
638
  "type": "semgrep_id",
637
639
  "name": "eslint.detect-eval-with-expression",
638
- "value": "eslint.detect-eval-with-expression"
640
+ "value": "eslint.detect-eval-with-expression",
641
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-eval-with-expression.js"
639
642
  },
640
643
  {
641
644
  "type": "semgrep_id",
642
645
  "name": "eslint.detect-new-buffer",
643
- "value": "eslint.detect-new-buffer"
646
+ "value": "eslint.detect-new-buffer",
647
+ "url": "https://github.com/eslint-community/eslint-plugin-security/blob/main/rules/detect-new-buffer.js"
644
648
  },
645
649
  {
646
650
  "type": "semgrep_id",
@@ -655,7 +659,8 @@
655
659
  {
656
660
  "type": "semgrep_id",
657
661
  "name": "eslint.detect-non-literal-require",
658
- "value": "eslint.detect-non-literal-require"
662
+ "value": "eslint.detect-non-literal-require",
663
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-non-literal-require.js"
659
664
  },
660
665
  {
661
666
  "type": "semgrep_id",
@@ -665,7 +670,8 @@
665
670
  {
666
671
  "type": "semgrep_id",
667
672
  "name": "eslint.detect-pseudoRandomBytes",
668
- "value": "eslint.detect-pseudoRandomBytes"
673
+ "value": "eslint.detect-pseudoRandomBytes",
674
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-pseudoRandomBytes.js"
669
675
  },
670
676
  {
671
677
  "type": "semgrep_id",
@@ -2190,12 +2196,14 @@
2190
2196
  {
2191
2197
  "type": "semgrep_id",
2192
2198
  "name": "java_crypto_rule_JwtDecodeWithoutVerify",
2193
- "value": "java_crypto_rule_JwtDecodeWithoutVerify"
2199
+ "value": "java_crypto_rule_JwtDecodeWithoutVerify",
2200
+ "url": "https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/"
2194
2201
  },
2195
2202
  {
2196
2203
  "type": "semgrep_id",
2197
2204
  "name": "java_crypto_rule_JwtNoneAlgorithm",
2198
- "value": "java_crypto_rule_JwtNoneAlgorithm"
2205
+ "value": "java_crypto_rule_JwtNoneAlgorithm",
2206
+ "url": "https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/"
2199
2207
  },
2200
2208
  {
2201
2209
  "type": "semgrep_id",
@@ -2205,7 +2213,8 @@
2205
2213
  {
2206
2214
  "type": "semgrep_id",
2207
2215
  "name": "java_csrf_rule-UnrestrictedRequestMapping",
2208
- "value": "java_csrf_rule-UnrestrictedRequestMapping"
2216
+ "value": "java_csrf_rule-UnrestrictedRequestMapping",
2217
+ "url": "https://find-sec-bugs.github.io/bugs.htm#SPRING_CSRF_UNRESTRICTED_REQUEST_MAPPING"
2209
2218
  },
2210
2219
  {
2211
2220
  "type": "semgrep_id",
@@ -2240,7 +2249,8 @@
2240
2249
  {
2241
2250
  "type": "semgrep_id",
2242
2251
  "name": "java_file_rule-FilePathTraversalHttpServlet",
2243
- "value": "java_file_rule-FilePathTraversalHttpServlet"
2252
+ "value": "java_file_rule-FilePathTraversalHttpServlet",
2253
+ "url": "https://find-sec-bugs.github.io/bugs.htm#PATH_TRAVERSAL_IN"
2244
2254
  },
2245
2255
  {
2246
2256
  "type": "semgrep_id",
@@ -2250,7 +2260,8 @@
2250
2260
  {
2251
2261
  "type": "semgrep_id",
2252
2262
  "name": "java_inject_rule-DangerousGroovyShell",
2253
- "value": "java_inject_rule-DangerousGroovyShell"
2263
+ "value": "java_inject_rule-DangerousGroovyShell",
2264
+ "url": "https://find-sec-bugs.github.io/bugs.htm#GROOVY_SHELL"
2254
2265
  },
2255
2266
  {
2256
2267
  "type": "semgrep_id",
@@ -2330,7 +2341,13 @@
2330
2341
  {
2331
2342
  "type": "semgrep_id",
2332
2343
  "name": "javascript_exec_rule-child-process",
2333
- "value": "javascript_exec_rule-child-process"
2344
+ "value": "javascript_exec_rule-child-process",
2345
+ "url": "https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-child-process.js"
2346
+ },
2347
+ {
2348
+ "type": "semgrep_id",
2349
+ "name": "kotlin_pathtraversal_rule-FilePathTraversal",
2350
+ "value": "kotlin_pathtraversal_rule-FilePathTraversal"
2334
2351
  },
2335
2352
  {
2336
2353
  "type": "semgrep_id",
@@ -2895,7 +2912,8 @@
2895
2912
  {
2896
2913
  "type": "semgrep_id",
2897
2914
  "name": "python_jwt_rule-jwt-none-alg",
2898
- "value": "python_jwt_rule-jwt-none-alg"
2915
+ "value": "python_jwt_rule-jwt-none-alg",
2916
+ "url": "https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/"
2899
2917
  },
2900
2918
  {
2901
2919
  "type": "semgrep_id",
@@ -3024,22 +3042,22 @@
3024
3042
  }
3025
3043
  ],
3026
3044
  "type": "sast",
3027
- "start_time": "2025-06-24T14:07:18",
3028
- "end_time": "2025-06-24T14:07:34",
3045
+ "start_time": "2025-07-22T14:07:09",
3046
+ "end_time": "2025-07-22T14:07:23",
3029
3047
  "status": "success",
3030
3048
  "observability": {
3031
3049
  "events": [
3032
3050
  {
3033
3051
  "event": "collect_sast_scan_metrics_from_pipeline",
3034
- "property": "becd775d-582f-423d-b2f6-6f3395f738c8",
3052
+ "property": "207235c3-ee47-451a-9bc3-3872e515e195",
3035
3053
  "label": "semgrep",
3036
3054
  "value": 0,
3037
- "version": "6.3.2",
3055
+ "version": "6.5.0",
3038
3056
  "exit_code": 0,
3039
3057
  "override_count": 0,
3040
3058
  "passthrough_count": 0,
3041
3059
  "custom_exclude_path_count": 0,
3042
- "time_s": 15,
3060
+ "time_s": 13,
3043
3061
  "file_count": 321
3044
3062
  }
3045
3063
  ]
@@ -1,15 +1,15 @@
1
1
  {
2
2
  "bomFormat": "CycloneDX",
3
3
  "specVersion": "1.4",
4
- "serialNumber": "urn:uuid:29a2b57b-45a7-459c-8aa4-6b12525e3b56",
4
+ "serialNumber": "urn:uuid:a26a6896-d274-4df7-a803-5ee738faff6d",
5
5
  "version": 1,
6
6
  "metadata": {
7
- "timestamp": "2025-06-24T14:08:19Z",
7
+ "timestamp": "2025-07-22T14:07:47Z",
8
8
  "tools": [
9
9
  {
10
10
  "vendor": "GitLab",
11
11
  "name": "Gemnasium",
12
- "version": "6.1.3"
12
+ "version": "6.1.8"
13
13
  }
14
14
  ],
15
15
  "authors": [
@@ -1807,10 +1807,10 @@
1807
1807
  },
1808
1808
  {
1809
1809
  "name": "soap",
1810
- "version": "1.1.12",
1811
- "purl": "pkg:npm/soap@1.1.12",
1810
+ "version": "1.2.0",
1811
+ "purl": "pkg:npm/soap@1.2.0",
1812
1812
  "type": "library",
1813
- "bom-ref": "pkg:npm/soap@1.1.12"
1813
+ "bom-ref": "pkg:npm/soap@1.2.0"
1814
1814
  },
1815
1815
  {
1816
1816
  "name": "string-width",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@stordata/vsphere-soapify",
3
- "version":"1.0.20250624140830",
3
+ "version":"1.0.20250722140755",
4
4
  "description": "A NodeJS abstraction layer for the vSphere SOAP API",
5
5
  "main": "index.js",
6
6
  "scripts": {
@@ -30,7 +30,7 @@
30
30
  "axios": "1.10.0",
31
31
  "debug": "4.4.1",
32
32
  "lodash": "4.17.21",
33
- "soap": "1.1.12",
33
+ "soap": "1.2.0",
34
34
  "tough-cookie": "5.1.2"
35
35
  },
36
36
  "devDependencies": {