Affected by GO-2023-1656
and 9 other vulnerabilities
GO-2023-1656: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1662: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1716: Answer vulnerable to Insertion of Sensitive Information Into Sent Data in github.com/answerdev/answer
GO-2023-1718: Answer vulnerable to Exposure of Sensitive Information Through Metadata in github.com/answerdev/answer
GO-2023-1774: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-1995: Answer has Race Condition within a Thread in github.com/answerdev/answer
GO-2023-1996: Answer Insufficient Session Expiration vulnerability in github.com/answerdev/answer
GO-2023-1997: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-2001: Answer has Weak Password Requirements in github.com/answerdev/answer
GO-2023-2051: Answer Missing Authentication for Critical Function in github.com/answerdev/answer
package
Version:
v1.0.6
Opens a new window with list of versions in this module.
Published: Mar 7, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 7
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
type SearchParser struct {
}
func (sp *SearchParser) ParseStructure(dto *schema.SearchDTO) (
searchType string,
userID string,
votes int,
notAccepted bool,
isQuestion bool,
views,
answers int,
accepted bool,
questionID string,
isAnswer bool,
tags,
words []string,
)
ParseStructure parse search structure, maybe match one of type all/questions/answers,
but if match two type, it will return false
Source Files
¶
Click to show internal directories.
Click to hide internal directories.