-
Updated
Nov 8, 2020 - Python
vulnerability
Here are 588 public repositories matching this topic...
-
Updated
Oct 26, 2020 - Python
-
Updated
Nov 11, 2020 - Vue
-
Updated
Oct 21, 2020 - Shell
-
Updated
Aug 28, 2020 - Java
-
Updated
Sep 10, 2020 - JavaScript
-
Updated
Nov 7, 2020 - Python
-
Updated
May 22, 2020 - Lua
-
Updated
Sep 12, 2020 - PHP
-
Updated
Nov 13, 2020
-
Updated
Sep 12, 2020 - Go
-
Updated
Oct 6, 2020 - Python
-
Updated
Oct 20, 2020 - JavaScript
-
Updated
Nov 13, 2020
-
Updated
Jul 1, 2020 - Java
-
Updated
Jun 21, 2020 - Python
-
Updated
Jul 20, 2020 - Python
-
Updated
Nov 2, 2018 - Python
-
Updated
Jun 12, 2020 - Python
-
Updated
Jan 11, 2018 - Ruby
-
Updated
Nov 13, 2020 - C
-
Updated
Feb 10, 2018 - Python
-
Updated
Sep 28, 2020 - Python
-
Updated
Aug 19, 2020 - Python
-
Updated
Jan 22, 2019 - Python
Improve this page
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."
Description
Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.
What did you expect to happen?
Characters in messages and values properly escaped.
What happened instead?
Error encountered in importing XML file by Jenkins XML parser.