Affected by GO-2024-2578
and 7 other vulnerabilities
GO-2024-2578: Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer
GO-2024-2579: Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer
GO-2024-2580: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer
GO-2024-2743: XSS vulnerability via personal website in github.com/apache/incubator-answer
GO-2024-3064: Apache Answer: The link to reset the user's password will remain valid after sending a new link in github.com/apache/incubator-answer
GO-2024-3065: Apache Answer: The link for resetting user password is not Single-Use in github.com/apache/incubator-answer
GO-2024-3158: Apache Answer: Avatar URL leaked user email addresses in github.com/apache/incubator-answer
GO-2024-3287: Apache Answer: Predictable Authorization Token Using UUIDv1 in github.com/apache/incubator-answer
package
Version:
v1.2.5-RC2
Opens a new window with list of versions in this module.
Published: Jan 30, 2024
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
-
func AnswerURL(permalink int, siteUrl, questionID, title, answerID string) string
-
func CommentURL(permalink int, siteUrl, questionID, title, answerID, commentID string) string
-
func QuestionURL(permalink int, siteUrl, questionID, title string) string
-
func UserURL(siteUrl, username string) string
func AnswerURL(permalink int, siteUrl, questionID, title, answerID string) string
AnswerURL get answer url
func CommentURL(permalink int, siteUrl, questionID, title, answerID, commentID string) string
CommentURL get comment url
QuestionURL get question url
Source Files
¶
Click to show internal directories.
Click to hide internal directories.