-
Updated
Dec 10, 2019 - Objective-C
scan
Here are 312 public repositories matching this topic...
-
Updated
May 20, 2020 - JavaScript
-
Updated
Apr 28, 2020 - Java
-
Updated
Sep 21, 2019 - Swift
The analyzer warns correctly, but the documentation for SCS0007 only has guidance for XmlReader and XmlDocument. The warning also appears for XmlPathDocument/XPathNavigator, which is also insecure by default on .NET version prior to 4.5.2. https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.md#xpathnavigator has guidance on an example fix
-
Updated
May 15, 2020 - Python
-
Updated
Nov 29, 2019 - Swift
Describe the bug
A clear and concise description of what the bug is.
To Reproduce
Steps to reproduce the behavior:
- Go to '...'
- Click on '....'
- Scroll down to '....'
- See error
Expected behavior
A clear and concise description of what you expected to happen.
Screenshots
If applicable, add screenshots to help explain your problem.
**Smartphone (please c
-
Updated
May 17, 2020 - Python
-
Updated
Nov 24, 2017 - Java
-
Updated
Mar 12, 2020 - PHP
-
Updated
Sep 4, 2018 - Objective-C
Improve this page
Add a description, image, and links to the scan topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the scan topic, visit your repo's landing page and select "manage topics."
Short Description
https://licensebuttons.net/ contains several buttons to CC licenses that are found as links often enough.
For instance https://licensebuttons.net/p/80x15.png or https://licensebuttons.net/l/GPL/2.0/88x62.png
Each such URL should be added as a license detection rule
Possible Labels
Select Category