We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent bda2237 commit 891b975Copy full SHA for 891b975
java/ql/src/experimental/Security/CWE/CWE-502/SpringExporterUnsafeDeserialization.qhelp
@@ -45,11 +45,11 @@ consider using global deserialization filters introduced in JEP 290.
45
The following example shows how a vulnerable HTTP endpoint can be defined
46
using <code>HttpInvokerServiceExporter</code> and Spring annotations:
47
</p>
48
-<sample src="UnsafeHttpInvokerEndpoint.java" />
+<sample src="SpringExporterUnsafeDeserialization.java" />
49
<p>
50
The next examples shows how the same vulnerable endpoint can be defined in a Spring XML config:
51
52
-<sample src="UnsafeHttpInvokerEndpoint.xml" />
+<sample src="SpringExporterUnsafeDeserialization.xml" />
53
</example>
54
55
<references>
0 commit comments