Home
last modified time | relevance | path

Searched refs:vulnerability (Results 1 – 22 of 22) sorted by relevance

/plugin/authgooglesheets/vendor/google/apiclient-services/src/OnDemandScanning/
H A DOccurrence.php314 public function setVulnerability(VulnerabilityOccurrence $vulnerability) argument
316 $this->vulnerability = $vulnerability;
323 return $this->vulnerability;
/plugin/authgooglesheets/vendor/google/apiclient-services/src/ContainerAnalysis/
H A DOccurrence.php314 public function setVulnerability(VulnerabilityOccurrence $vulnerability) argument
316 $this->vulnerability = $vulnerability;
323 return $this->vulnerability;
H A DNote.php333 public function setVulnerability(VulnerabilityNote $vulnerability) argument
335 $this->vulnerability = $vulnerability;
342 return $this->vulnerability;
/plugin/authgooglesheets/vendor/google/apiclient-services/src/SecurityCommandCenter/
H A DFinding.php447 public function setVulnerability(Vulnerability $vulnerability) argument
449 $this->vulnerability = $vulnerability;
456 return $this->vulnerability;
/plugin/dw2pdf/vendor/setasign/fpdi/
H A DSECURITY.md3 To report a security vulnerability, please use the
/plugin/exttab2/
H A DREADME.md14 2010-08-28 0.3.0 (hopefully) fixed XSS vulnerability (Ashish Myles)
/plugin/note/
H A DCHANGES.md23 * plug the security vulnerability which could allow malicious HTML or JavaScript to infiltrate your wiki
/plugin/findologicxmlexport/vendor/hoa/file/
H A DCHANGELOG.md12 * Finder: Reduce error vulnerability. (Ivan Enderlin, 2016-10-13T22:43:03+02:00)
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/
H A DREADME.md59 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
/plugin/aichat/vendor/erusev/parsedown/
H A DREADME.md51 In both cases you should strongly consider employing defence-in-depth measures, like [deploying a Content-Security-Policy](https://scotthelme.co.uk/content-security-policy-an-introduction/) (a browser security feature) so that your page is likely to be safe even if an attacker finds a vulnerability in one of the first lines of defence above.
/plugin/codeprettify/code-prettify/
H A DCHANGES.md115 already has an XSS vulnerability. If you sanitize and prettify HTML from an
/plugin/commonmark/vendor/league/commonmark/
H A DREADME.md133 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com/security). Tidelift will coordinate the fix and disclosure with us.
H A DCHANGELOG-0.x.md
/plugin/authgooglesheets/vendor/guzzlehttp/promises/
H A DREADME.md537 If you discover a security vulnerability within this package, please send an email to security@tide…
/plugin/authgooglesheets/vendor/guzzlehttp/psr7/
H A DREADME.md814 If you discover a security vulnerability within this package, please send an email to security@tide…
/plugin/flowplayer/player/
H A DREADME.txt69 - fixed XSS vulnerability with linkUrls. Thank you Szymon Gruszecki for discovering and reporting t…
/plugin/adfs/phpsaml/
H A DREADME.md17 …directly affected since it implements additional checks that prevent to exploit that vulnerability.
36 If you believe you have discovered a security vulnerability in this toolkit, please report it at ht…
/plugin/amcharts/assets/amcharts/plugins/export/
H A DREADME.md893 * Fixed: potential vulnerability with anonymous function declaration
/plugin/ckgedit/ckeditor/
H A DCHANGES.md80 * Fixed XSS vulnerability in the HTML parser reported by [maxarr](https://hackerone.com/maxarr).
226 * Fixed XSS vulnerability in the [Enhanced Image](https://ckeditor.com/cke4/addon/image2) (`image2`…
594 * [Severity: minor] Fixed the `target="_blank"` vulnerability reported by James Gaskell.
950 * Fixed XSS vulnerability in the HTML parser reported by [Dheeraj Joshi](https://twitter.com/dheera…
1006 * Fixed XSS vulnerability in the HTML parser reported by [Maco Cortes](https://www.facebook.com/Maa…
1099 * Fixed XSS vulnerability in the Preview plugin reported by Mario Heiderich of [Cure53](https://cur…
/plugin/ckgdoku/ckeditor/
H A DCHANGES.md174 * [Severity: minor] Fixed the `target="_blank"` vulnerability reported by James Gaskell.
530 * Fixed XSS vulnerability in the HTML parser reported by [Dheeraj Joshi](https://twitter.com/dheera…
586 * Fixed XSS vulnerability in the HTML parser reported by [Maco Cortes](https://www.facebook.com/Maa…
679 * Fixed XSS vulnerability in the Preview plugin reported by Mario Heiderich of [Cure53](https://cur…
/plugin/authgooglesheets/vendor/guzzlehttp/guzzle/
H A DCHANGELOG.md111 * Address HTTP_PROXY security vulnerability, CVE-2016-5385:
/plugin/webdav/vendor/sabre/dav/
H A DCHANGELOG.md1108 * Fixed: Potential security vulnerability in the http client.