Skip to content

Conversation

@Regzox
Copy link
Contributor

@Regzox Regzox commented Dec 19, 2025

No description provided.

@Regzox Regzox added this to the IT 163 milestone Dec 19, 2025
@Regzox Regzox added the VAS VAS contribution label Dec 19, 2025
@Regzox Regzox self-assigned this Dec 19, 2025
@Regzox Regzox marked this pull request as draft December 19, 2025 15:32
@vitam-prg
Copy link
Collaborator

vitam-prg commented Dec 19, 2025

Logo
Checkmarx One – Scan Summary & Detailsb8ebc95e-4c9f-4138-8235-575ece8e9662

New Issues (46)

Checkmarx found the following issues in this Pull Request

# Severity Issue Source File / Package Checkmarx Insight
1 CRITICAL CVE-2019-17571 Maven-log4j:log4j-1.2.17
detailsDescription: Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute ar...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
2 CRITICAL CVE-2022-23305 Maven-log4j:log4j-1.2.17
detailsDescription: By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters fro...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
3 CRITICAL CVE-2022-28890 Maven-org.apache.jena:jena-core-2.11.2
detailsRecommended version: 4.2.0
Description: A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena ve...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
4 CRITICAL CVE-2024-50379 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits Remote Code Execution on case-insen...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
5 CRITICAL CVE-2024-56337 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. Users running Tomcat on a case insensitive file system with the ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
6 CRITICAL CVE-2025-24813 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution (RCE) and/or Information disclosure and/or malicious content added to...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
7 CRITICAL CVE-2025-31651 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability was found within Apache Tomcat. For a subset of unlikely rewrite rule c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
8 CRITICAL CVE-2025-41243 Maven-org.springframework.cloud:spring-cloud-gateway-server-4.3.0
detailsRecommended version: 4.3.2
Description: Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification in versions 3.1.0 through 3.1.10, 4.0.0 through 4...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
9 CRITICAL CVE-2025-65482 Maven-fr.opensagres.xdocreport:fr.opensagres.xdocreport.document-2.0.3
detailsRecommended version: 2.0.4
Description: An XML External Entity (XXE) vulnerability in opensagres XDocReport versions 0.9.2 through 2.0.3 allows attackers to execute arbitrary code via upl...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
10 HIGH CVE-2017-9096 Maven-com.lowagie:itext-2.1.7
detailsDescription: The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML ext...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
11 HIGH CVE-2021-39239 Maven-org.apache.jena:jena-core-2.11.2
detailsRecommended version: 4.2.0
Description: A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
12 HIGH CVE-2021-4104 Maven-log4j:log4j-1.2.17
detailsDescription: JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The atta...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
13 HIGH CVE-2022-23302 Maven-log4j:log4j-1.2.17
detailsDescription: JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configurati...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
14 HIGH CVE-2022-23307 Maven-log4j:log4j-1.2.17
detailsDescription: CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0, Chainsaw was a component of Apache Lo...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
15 HIGH CVE-2023-26464 Maven-log4j:log4j-1.2.17
detailsDescription: When using the Chainsaw or SocketAppender components with Log4j versions 1.0.4 prior to 2.0, an attacker that manages to cause a logging entry invo...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
16 HIGH CVE-2024-22233 Maven-org.springframework:spring-core-6.1.2
detailsRecommended version: 6.2.11
Description: In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-serv...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
17 HIGH CVE-2024-22234 Maven-org.springframework.security:spring-security-core-6.2.1
detailsRecommended version: 6.2.8
Description: In Spring Security, versions 6.1.x prior to 6.1.7, 6.2.x prior to 6.2.2, and 6.3.0-M1 an application is vulnerable to broken access control when it...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
18 HIGH CVE-2024-22234 Maven-org.springframework.security:spring-security-web-6.2.1
detailsRecommended version: 6.2.8
Description: In Spring Security, versions 6.1.x prior to 6.1.7, 6.2.x prior to 6.2.2, and 6.3.0-M1 an application is vulnerable to broken access control when it...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
19 HIGH CVE-2024-57699 Maven-net.minidev:json-smart-2.5.0
detailsRecommended version: 2.5.2
Description: A security issue was found in Netplex Json-smart. When loading a specially crafted JSON input, containing a large number of "{", a stack exhaustion...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
20 HIGH CVE-2025-24970 Maven-io.netty:netty-handler-4.1.104.Final
detailsRecommended version: 4.1.118.Final
Description: Netty, an asynchronous, event-driven network application framework, has a vulnerability in version 4.1.91.Final through 4.1.117.Final and 4.2.0.Alp...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
21 HIGH CVE-2025-31650 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Improper Input Validation vulnerability was found in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in inc...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
22 HIGH CVE-2025-41253 Maven-org.springframework.cloud:spring-cloud-gateway-server-4.3.0
detailsRecommended version: 4.3.2
Description: The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system propertie...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
23 HIGH CVE-2025-46701 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that a...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
24 HIGH CVE-2025-48976 Maven-commons-fileupload:commons-fileupload-1.5
detailsRecommended version: 1.6.0
Description: Allocation of resources for multipart headers with insufficient limits enabled a Denial of Service (DoS) vulnerability in Apache Commons FileUpload...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
25 HIGH CVE-2025-48988 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat versions 9.0.0.M1 through 9....
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
26 HIGH CVE-2026-22610 Npm-@angular/core-19.2.17
detailsRecommended version: 19.2.18
Description: Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versio...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
27 HIGH CVE-2026-22610 Npm-@angular/compiler-19.2.17
detailsRecommended version: 19.2.18
Description: Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versio...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
28 HIGH CVE-2026-25128 Npm-fast-xml-parser-5.3.3
detailsRecommended version: 5.3.4
Description: fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
29 HIGH Client_DOM_XSS /cas/cas-server/src/main/resources/static/js/duo/Duo-Web-v2.min.js: 136
detailsThe method B embeds untrusted data in generated output with appendChild, at line 193 of /cas/cas-server/src/main/resources/static/js/duo/Duo-Web...
Attack Vector
30 MEDIUM CVE-2024-12798 Maven-ch.qos.logback:logback-classic-1.4.14
detailsRecommended version: 1.5.13
Description: Arbitrary Code Execution vulnerability in "JaninoEventEvaluator" by QOS.CH logback in Java applications, allows attackers to execute arbitrary code...
Attack Vector: LOCAL
Attack Complexity: LOW
Vulnerable Package
31 MEDIUM CVE-2024-12798 Maven-ch.qos.logback:logback-core-1.4.14
detailsRecommended version: 1.5.25
Description: Arbitrary Code Execution vulnerability in "JaninoEventEvaluator" by QOS.CH logback in Java applications, allows attackers to execute arbitrary code...
Attack Vector: LOCAL
Attack Complexity: LOW
Vulnerable Package
32 MEDIUM CVE-2024-29025 Maven-io.netty:netty-codec-http-4.1.104.Final
detailsRecommended version: 4.1.129.Final
Description: Netty is an asynchronous event-driven network application framework for the rapid development of maintainable high-performance protocol servers & c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
33 MEDIUM CVE-2025-31672 Maven-org.apache.poi:poi-ooxml-5.2.5
detailsRecommended version: 5.4.0
Description: Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file for...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
34 MEDIUM CVE-2025-41234 Maven-org.springframework:spring-web-6.1.2
detailsRecommended version: 6.1.21
Description: In Spring Framework, versions 6.0.x through 6.0.28, 6.1.x through 6.1.20, 6.2.x through 6.2.7, and 7.x through 7.0.0-m5, an application is vulnerab...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
35 MEDIUM CVE-2025-46392 Maven-commons-configuration:commons-configuration-1.10
detailsDescription: Uncontrolled Resource Consumption vulnerability in Apache Commons Configuration versions 1.x. There are a number of issues in Apache Commons Confi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
36 MEDIUM CVE-2025-49125 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using `PreResources` or `PostResources` mounted other...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
37 MEDIUM CVE-2025-55668 Maven-org.apache.tomcat.embed:tomcat-embed-core-10.1.31
detailsRecommended version: 10.1.47
Description: Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects org.apache.tomcat:tomcat-catalina: versions from 8.0.0-RC1 th...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
38 MEDIUM CVE-2025-7962 Maven-org.eclipse.angus:jakarta.mail-2.0.2
detailsRecommended version: 2.0.4
Description: In Jakarta Mail through 2.0.3 it is possible to preform a SMTP Injection by utilizing the"\r" and "\n" UTF-8 characters to separate different messa...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (180) Great job! The following issues were fixed in this Pull Request
Severity Issue Source File / Package
CRITICAL CVE-2016-1000027 Maven-org.springframework:spring-web-5.3.22
CRITICAL CVE-2016-1000027 Maven-org.springframework:spring-webmvc-5.3.22
CRITICAL CVE-2022-1471 Maven-org.yaml:snakeyaml-1.31
CRITICAL CVE-2022-31692 Maven-org.springframework.security:spring-security-core-5.7.3
CRITICAL CVE-2023-20873 Maven-org.springframework.boot:spring-boot-actuator-autoconfigure-2.7.3
CRITICAL CVE-2023-34034 Maven-org.springframework.security:spring-security-config-5.7.3
CRITICAL CVE-2023-34034 Maven-org.springframework.security:spring-security-web-5.7.3
HIGH CVE-2012-0881 Maven-xerces:xercesImpl-2.9.1
HIGH CVE-2013-4002 Maven-xerces:xercesImpl-2.9.1
HIGH CVE-2022-31690 Maven-org.springframework.security:spring-security-web-5.7.3
HIGH CVE-2022-40152 Maven-com.fasterxml.woodstox:woodstox-core-6.2.6
HIGH CVE-2022-42003 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.4
HIGH CVE-2022-45688 Maven-org.json:json-20160810
HIGH CVE-2022-45689 Maven-org.json:json-20160810
HIGH CVE-2022-45690 Maven-org.json:json-20160810
HIGH CVE-2023-1370 Maven-net.minidev:json-smart-2.4.8
HIGH CVE-2023-20860 Maven-org.springframework:spring-webmvc-5.3.22
HIGH CVE-2023-2976 Maven-com.google.guava:guava-30.1.1-jre
HIGH CVE-2023-31582 Maven-org.bitbucket.b_c:jose4j-0.8.0
HIGH CVE-2023-33265 Maven-com.hazelcast:hazelcast-5.1.3
HIGH CVE-2023-34620 Maven-org.hjson:hjson-3.0.0
HIGH CVE-2023-38286 Maven-org.thymeleaf:thymeleaf-3.0.15.RELEASE
HIGH CVE-2023-39685 Maven-org.hjson:hjson-3.0.0
HIGH CVE-2023-45859 Maven-com.hazelcast:hazelcast-5.1.3
HIGH CVE-2023-45860 Maven-com.hazelcast:hazelcast-sql-5.1.3
HIGH CVE-2023-45860 Maven-com.hazelcast:hazelcast-5.1.3
HIGH CVE-2023-46120 Maven-com.rabbitmq:amqp-client-5.15.0
HIGH CVE-2023-5072 Maven-org.json:json-20160810
HIGH CVE-2023-51775 Maven-org.bitbucket.b_c:jose4j-0.8.0
HIGH CVE-2023-52428 Maven-com.nimbusds:nimbus-jose-jwt-9.24.3
HIGH CVE-2024-21634 Maven-software.amazon.ion:ion-java-1.0.2
HIGH CVE-2025-52999 Maven-com.fasterxml.jackson.core:jackson-core-2.13.4
HIGH Cx08fcacc9-cb99 Maven-org.json:json-20160810
HIGH Cx2906ba70-607a Maven-org.json:json-20160810
HIGH Cx8bc13cba-30bf Maven-org.bitbucket.b_c:jose4j-0.8.0
HIGH Cxdb5a1032-eda2 Maven-org.json:json-20160810
MEDIUM CVE-2009-2625 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2015-9251 Maven-org.webjars:jquery-1.12.0
MEDIUM CVE-2017-10355 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2018-2799 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2019-11358 Maven-org.webjars:jquery-1.12.0
MEDIUM CVE-2020-11023 Maven-org.webjars:jquery-1.12.0
MEDIUM CVE-2020-14338 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2020-15250 Maven-junit:junit-4.13
MEDIUM CVE-2021-28170 Maven-org.glassfish.web:el-impl-2.2
MEDIUM CVE-2022-22976 Maven-org.springframework.security:spring-security-crypto-5.6.1
MEDIUM CVE-2022-23437 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2022-38752 Maven-org.yaml:snakeyaml-1.31
MEDIUM CVE-2022-41854 Maven-org.yaml:snakeyaml-1.31
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2023-20862 Maven-org.springframework.security:spring-security-web-5.7.3
MEDIUM CVE-2023-20862 Maven-org.springframework.security:spring-security-config-5.7.3
MEDIUM CVE-2023-20863 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2023-33264 Maven-com.hazelcast:hazelcast-5.1.3
MEDIUM CVE-2023-34055 Maven-org.springframework.boot:spring-boot-actuator-2.7.3
MEDIUM CVE-2023-34462 Maven-io.netty:netty-handler-4.1.80.Final
MEDIUM CVE-2023-44483 Maven-org.apache.santuario:xmlsec-2.3.0
MEDIUM CVE-2024-38808 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2024-38828 Maven-org.springframework:spring-webmvc-5.3.22
MEDIUM CVE-2025-8885 Maven-org.bouncycastle:bcprov-jdk18on-1.71
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 193
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 153
MEDIUM Privacy_Violation /api/api-iam/iam-commons/src/main/java/fr/gouv/vitamui/iam/common/utils/Pac4jClientBuilder.java: 88
MEDIUM Privacy_Violation /api/api-iam/iam-commons/src/main/java/fr/gouv/vitamui/iam/common/utils/Pac4jClientBuilder.java: 106
MEDIUM Privacy_Violation /api/api-iam/iam-commons/src/main/java/fr/gouv/vitamui/iam/common/utils/Pac4jClientBuilder.java: 105
LOW CVE-2020-8908 Maven-com.google.guava:guava-30.1.1-jre
LOW Heap_Inspection /cas/cas-server/src/main/java/fr/gouv/vitamui/cas/webflow/actions/TriggerChangePasswordAction.java: 72
LOW Heap_Inspection /cas/cas-server/src/main/java/fr/gouv/vitamui/cas/webflow/actions/I18NSendPasswordResetInstructionsAction.java: 197
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 168
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 166
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 166
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 166
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 215
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 216
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 216
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 216
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 194
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 193
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 192
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 195
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 193
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 195
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 193
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/ProjectController.java: 195
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 201
LOW Log_Forging /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 201

More results are available on the CxOne platform


Use @Checkmarx to interact with Checkmarx PR Assistant.
Examples:
@Checkmarx how are you able to help me?
@Checkmarx rescan this PR

@Regzox Regzox force-pushed the story_15455 branch 3 times, most recently from 913c13d to 4f8e575 Compare January 15, 2026 10:32
@Regzox Regzox force-pushed the story_15455 branch 3 times, most recently from bcfaad6 to ccc364f Compare February 3, 2026 09:18
@Regzox Regzox marked this pull request as ready for review February 5, 2026 14:34
@GiooDev GiooDev added the Highlight Important feature for release note label Feb 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Highlight Important feature for release note VAS VAS contribution

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants