Affected by GO-2024-2743
and 4 other vulnerabilities
GO-2024-2743: XSS vulnerability via personal website in github.com/apache/incubator-answer
GO-2024-3064: Apache Answer: The link to reset the user's password will remain valid after sending a new link in github.com/apache/incubator-answer
GO-2024-3065: Apache Answer: The link for resetting user password is not Single-Use in github.com/apache/incubator-answer
GO-2024-3158: Apache Answer: Avatar URL leaked user email addresses in github.com/apache/incubator-answer
GO-2024-3287: Apache Answer: Predictable Authorization Token Using UUIDv1 in github.com/apache/incubator-answer
package
Version:
v1.3.0-RC1
Opens a new window with list of versions in this module.
Published: Mar 25, 2024
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
-
func AnswerURL(permalink int, siteUrl, questionID, title, answerID string) string
-
func CommentURL(permalink int, siteUrl, questionID, title, answerID, commentID string) string
-
func QuestionURL(permalink int, siteUrl, questionID, title string) string
-
func UserURL(siteUrl, username string) string
func AnswerURL(permalink int, siteUrl, questionID, title, answerID string) string
AnswerURL get answer url
func CommentURL(permalink int, siteUrl, questionID, title, answerID, commentID string) string
CommentURL get comment url
QuestionURL get question url
Source Files
¶
Click to show internal directories.
Click to hide internal directories.