Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for vulnerabilities (0.05 sec)

  1. .github/workflows/codeql-analysis.yml

            # Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python']
            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
    Registered: Thu Sep 04 15:34:10 UTC 2025
    - Last Modified: Fri Oct 02 13:24:14 UTC 2020
    - 2.5K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/ds/DataStoreFactory.java

         * in the data store plugin directory and extracts component class names.
         *
         * <p>The method uses secure XML parsing features to prevent XXE attacks and
         * other XML-based vulnerabilities. Component class names are extracted from
         * the 'class' attribute of 'component' elements in the XML files.</p>
         *
         * @return sorted list of data store class simple names discovered from plugins
         */
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 8.4K bytes
    - Viewed (0)
Back to top