-
Updated
Oct 26, 2020 - Python
vulnerability-scanners
Here are 246 public repositories matching this topic...
-
Updated
Nov 5, 2020 - Go
-
Updated
Nov 9, 2020 - Shell
-
Updated
Sep 28, 2020
-
Updated
Jan 29, 2020 - Python
-
Updated
Sep 10, 2020 - JavaScript
-
Updated
May 22, 2020 - Lua
-
Updated
Nov 10, 2020 - Shell
-
Updated
Nov 4, 2020 - Python
-
Updated
Nov 10, 2020 - Ruby
-
Updated
Jan 11, 2018 - Ruby
-
Updated
Nov 10, 2020 - C
-
Updated
Nov 9, 2020 - Python
-
Updated
Nov 7, 2020 - Python
-
Updated
Feb 10, 2018 - Python
-
Updated
Sep 28, 2020 - Python
-
Updated
Nov 18, 2019
-
Updated
Oct 29, 2020 - Perl
-
Updated
Apr 25, 2019 - Python
-
Updated
May 10, 2019 - Python
-
Updated
Oct 11, 2020 - Python
-
Updated
Jul 1, 2020 - Java
-
Updated
May 20, 2020 - Perl 6
-
Updated
Feb 29, 2020 - Pascal
-
Updated
Oct 29, 2020 - HTML
-
Updated
Aug 12, 2020 - Python
Improve this page
Add a description, image, and links to the vulnerability-scanners topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability-scanners topic, visit your repo's landing page and select "manage topics."
Description
Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.
What did you expect to happen?
Characters in messages and values properly escaped.
What happened instead?
Error encountered in importing XML file by Jenkins XML parser.