Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for vulnerabilities (0.05 sec)

  1. .github/workflows/codeql-analysis.yml

            # Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python']
            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v4
    
        # Initializes the CodeQL tools for scanning.
    Registered: Sat Dec 20 09:13:53 UTC 2025
    - Last Modified: Thu Nov 20 13:34:13 UTC 2025
    - 2.1K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/crawler/serializer/DataSerializer.java

                // TODO use kryo.register for security
                // SECURITY WARNING: setRegistrationRequired(false) allows deserialization of arbitrary classes
                // which could potentially lead to remote code execution vulnerabilities.
                // This should be replaced with explicit class registration using kryo.register()
                // for all classes that need to be serialized/deserialized.
                kryo.setRegistrationRequired(false);
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Wed Nov 19 07:09:17 UTC 2025
    - 6.5K bytes
    - Viewed (3)
  3. src/main/java/org/codelibs/fess/ds/DataStoreFactory.java

         * in the data store plugin directory and extracts component class names.
         *
         * <p>The method uses secure XML parsing features to prevent XXE attacks and
         * other XML-based vulnerabilities. Component class names are extracted from
         * the 'class' attribute of 'component' elements in the XML files.</p>
         *
         * @return sorted list of data store class simple names discovered from plugins
         */
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 9K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/core/io/SerializeUtil.java

         * <p>
         * WARNING: Use this only when you completely trust the data source and have
         * other security measures in place. Unrestricted deserialization can lead to
         * remote code execution vulnerabilities.
         * </p>
         *
         * @return an ObjectInputFilter that allows all classes
         */
        public static ObjectInputFilter createPermissiveFilter() {
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Sat Nov 22 11:21:59 UTC 2025
    - 9K bytes
    - Viewed (0)
Back to top