-
Updated
Nov 12, 2020 - Go
vulnerability-detection
Here are 183 public repositories matching this topic...
-
Updated
Nov 12, 2020 - Shell
-
Updated
Jan 29, 2020 - Python
-
Updated
Jan 28, 2020 - Ruby
-
Updated
Nov 13, 2020 - Java
-
Updated
Nov 13, 2020 - C
-
Updated
May 22, 2020 - Lua
-
Updated
Nov 12, 2020 - Python
-
Updated
Nov 4, 2020 - Python
-
Updated
Jun 12, 2020 - Python
-
Updated
Oct 15, 2020 - BitBake
-
Updated
Nov 13, 2020 - C
-
Updated
Nov 9, 2020 - Python
-
Updated
Nov 12, 2020 - Perl
-
Updated
Feb 10, 2018 - Python
-
Updated
Nov 5, 2020 - Shell
-
Updated
Oct 11, 2020 - Python
-
Updated
Nov 9, 2020 - Java
-
Updated
Jan 10, 2020 - JavaScript
-
Updated
Nov 12, 2020 - Ruby
-
Updated
Apr 20, 2020 - Python
-
Updated
Oct 28, 2020 - Python
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
-
Updated
Oct 15, 2020 - Python
-
Updated
Sep 28, 2018 - Python
-
Updated
Nov 13, 2020 - Python
-
Updated
Apr 30, 2019 - C++
-
Updated
Jun 24, 2020 - Python
-
Updated
May 28, 2020 - C++
Improve this page
Add a description, image, and links to the vulnerability-detection topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability-detection topic, visit your repo's landing page and select "manage topics."
Description
Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.
What did you expect to happen?
Characters in messages and values properly escaped.
What happened instead?
Error encountered in importing XML file by Jenkins XML parser.