- Sort Score
- Result 10 results
- Languages All
Results 1 - 2 of 2 for vulnerabilities (0.05 sec)
-
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v2 with:
Registered: Thu Sep 04 15:34:10 UTC 2025 - Last Modified: Fri Oct 02 13:24:14 UTC 2020 - 2.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ds/DataStoreFactory.java
* in the data store plugin directory and extracts component class names. * * <p>The method uses secure XML parsing features to prevent XXE attacks and * other XML-based vulnerabilities. Component class names are extracted from * the 'class' attribute of 'component' elements in the XML files.</p> * * @return sorted list of data store class simple names discovered from plugins */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 8.4K bytes - Viewed (0)