We had a penetration tester discover pages in our wicket 6 apps where a javascript injection attack could be successful. Basically put script tags with javascri
qjsondocument
sectionheader
pari
serilog-sinks-elasticsearch
patchwork
ssis-2017
m2m
minimum-size
pvlib
dotnet-dev-certs
webpack-serve
google-plus-signin
pm2
axiom
bq-load
viewpropertyanimator
alertify.js
jackson-dataformat-xml
d
ccxt
nativescript-vue
var-dump
converter
intellij-inspections
periodic-task
android-mediarecorder
optparse
uint64
jackson-dataformat-avro
azure-rest-api