diff --git a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S2755_java.html b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S2755_java.html index 03c0e8f4212..174f1cd595c 100644 --- a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S2755_java.html +++ b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S2755_java.html @@ -97,8 +97,8 @@

Compliant Solution

// to be compliant, completely disable DOCTYPE declaration: factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); // or prohibit the use of all protocols by external entities: -factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); -factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); +factory.setProperty(XMLConstants.ACCESS_EXTERNAL_DTD, ""); +factory.setProperty(XMLConstants.ACCESS_EXTERNAL_SCHEMA, "");

For Dom4j library:

diff --git a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4454_java.json b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4454_java.json
index ffb27196b35..ad958a6e678 100644
--- a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4454_java.json
+++ b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4454_java.json
@@ -11,5 +11,5 @@
   "ruleSpecification": "RSPEC-4454",
   "sqKey": "S4454",
   "scope": "Main",
-  "quickfix": "unknown"
+  "quickfix": "covered"
 }
diff --git a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4502_java.html b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4502_java.html
index 937998650f4..d2e461bbe3f 100644
--- a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4502_java.html
+++ b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4502_java.html
@@ -23,7 +23,7 @@ 

Recommended Secure Coding Practices

used only for information retrieval.

Sensitive Code Example

-

Spring Security provides by default a +

Spring Security provides by default a protection against CSRF attacks which can be disabled:

 @EnableWebSecurity
@@ -38,8 +38,8 @@ 

Sensitive Code Example

}

Compliant Solution

-

Spring Security CSRF protection is enabled by -default, do not disable it:

+

Spring Security CSRF protection is enabled +by default, do not disable it:

 @EnableWebSecurity
 public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
diff --git a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4682_java.json b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4682_java.json
index 20145a8dd74..314f4b92481 100644
--- a/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4682_java.json
+++ b/java-checks/src/main/resources/org/sonar/l10n/java/rules/java/S4682_java.json
@@ -11,5 +11,5 @@
   "ruleSpecification": "RSPEC-4682",
   "sqKey": "S4682",
   "scope": "Main",
-  "quickfix": "unknown"
+  "quickfix": "covered"
 }
diff --git a/sonarpedia.json b/sonarpedia.json
index 982a4b313a2..5ad81be28c9 100644
--- a/sonarpedia.json
+++ b/sonarpedia.json
@@ -3,7 +3,7 @@
   "languages": [
     "JAVA"
   ],
-  "latest-update": "2021-11-12T14:11:50.317565Z",
+  "latest-update": "2021-11-29T09:45:01.091445200Z",
   "options": {
     "no-language-in-filenames": false,
     "preserve-filenames": false