- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for vulnerabilities (0.05 sec)
-
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v4 # Initializes the CodeQL tools for scanning.
Registered: Sat Dec 20 09:13:53 UTC 2025 - Last Modified: Thu Nov 20 13:34:13 UTC 2025 - 2.1K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/crawler/serializer/DataSerializer.java
// TODO use kryo.register for security // SECURITY WARNING: setRegistrationRequired(false) allows deserialization of arbitrary classes // which could potentially lead to remote code execution vulnerabilities. // This should be replaced with explicit class registration using kryo.register() // for all classes that need to be serialized/deserialized. kryo.setRegistrationRequired(false);Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Wed Nov 19 07:09:17 UTC 2025 - 6.5K bytes - Viewed (3) -
src/main/java/org/codelibs/fess/ds/DataStoreFactory.java
* in the data store plugin directory and extracts component class names. * * <p>The method uses secure XML parsing features to prevent XXE attacks and * other XML-based vulnerabilities. Component class names are extracted from * the 'class' attribute of 'component' elements in the XML files.</p> * * @return sorted list of data store class simple names discovered from plugins */Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Fri Nov 28 16:29:12 UTC 2025 - 9K bytes - Viewed (0) -
src/main/java/org/codelibs/core/io/SerializeUtil.java
* <p> * WARNING: Use this only when you completely trust the data source and have * other security measures in place. Unrestricted deserialization can lead to * remote code execution vulnerabilities. * </p> * * @return an ObjectInputFilter that allows all classes */ public static ObjectInputFilter createPermissiveFilter() {Registered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ldap/LdapManager.java
* </ul> * * <p><strong>Security Note:</strong> This method MUST be called on all user-supplied * input before using it in LDAP search filters to prevent LDAP injection vulnerabilities. * * @param filter the LDAP search filter to escape (null is treated as empty string) * @return the escaped filter string safe for use in LDAP queries (empty string if filter is null)Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Fri Nov 28 16:29:12 UTC 2025 - 86.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.32.md
## Changelog since v1.32.7 ## Important Security Information This release contains changes that address the following vulnerabilities: ### CVE-2025-5187: Nodes can delete themselves by adding an OwnerReference
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 16 18:27:41 UTC 2025 - 448.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.33.md
## Changelog since v1.33.3 ## Important Security Information This release contains changes that address the following vulnerabilities: ### CVE-2025-5187: Nodes can delete themselves by adding an OwnerReference
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:15:24 UTC 2025 - 334.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
## Changelog since v1.31.11 ## Important Security Information This release contains changes that address the following vulnerabilities: ### CVE-2025-5187: Nodes can delete themselves by adding an OwnerReference
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Nov 12 11:33:21 UTC 2025 - 451.9K bytes - Viewed (0)