Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow iconv() of GLIBC (CVE-2024-2961) #178
command_shell_acceptance.yml
on: pull_request
Matrix: test
Generate report
18s
Annotations
6 errors and 5 warnings
linux ubuntu-20.04
The process '/opt/hostedtoolcache/Ruby/3.0.2/x64/bin/bundle' failed with exit code 16
|
cmd windows-2019
The process 'C:\hostedtoolcache\windows\Ruby\3.0.2\x64\bin\bundle.bat' failed with exit code 16
|
cmd windows-2022
The process 'C:\hostedtoolcache\windows\Ruby\3.1.5\x64\bin\bundle.bat' failed with exit code 16
|
powershell windows-2022
The process 'C:\hostedtoolcache\windows\Ruby\3.1.5\x64\bin\bundle.bat' failed with exit code 16
|
Generate report
Process completed with exit code 2.
|
Generate report
The process '/opt/hostedtoolcache/Ruby/3.1.5/x64/bin/bundle' failed with exit code 16
|
linux ubuntu-20.04
No files were found with the provided path: metasploit-framework/tmp/allure-raw-data. No artifacts will be uploaded.
|
cmd windows-2019
No files were found with the provided path: metasploit-framework/tmp/allure-raw-data. No artifacts will be uploaded.
|
cmd windows-2022
No files were found with the provided path: metasploit-framework/tmp/allure-raw-data. No artifacts will be uploaded.
|
powershell windows-2022
No files were found with the provided path: metasploit-framework/tmp/allure-raw-data. No artifacts will be uploaded.
|
Generate report
No files were found with the provided path: ./allure-report. No artifacts will be uploaded.
|