Skip to content
#

vulnerability

Here are 588 public repositories matching this topic...

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Oct 26, 2020
  • Python
phr0zenx
phr0zenx commented Oct 30, 2020

Description

Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.

What did you expect to happen?

Characters in messages and values properly escaped.

What happened instead?

Error encountered in importing XML file by Jenkins XML parser.

Caused by: org.xml.sax.SAXParseException; l

Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340

  • Updated Nov 7, 2020
  • Python

Improve this page

Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.