Show filters
29 Total Results
Displaying 11-20 of 29
Sort by:
Attacker Value
Unknown

CVE-2020-22669

Disclosure Date: September 02, 2022 (last updated October 08, 2023)
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
Attacker Value
Unknown

CVE-2022-24891

Disclosure Date: April 27, 2022 (last updated October 07, 2023)
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Attacker Value
Unknown

CVE-2022-23457

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
Attacker Value
Unknown

CVE-2022-27820

Disclosure Date: March 24, 2022 (last updated October 07, 2023)
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.
Attacker Value
Unknown

CVE-2021-35368

Disclosure Date: November 05, 2021 (last updated November 08, 2023)
OWASP ModSecurity Core Rule Set 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.2 is affected by a Request Body Bypass via a trailing pathname.
Attacker Value
Unknown

CVE-2021-42575

Disclosure Date: October 18, 2021 (last updated November 28, 2024)
The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.
Attacker Value
Unknown

CVE-2021-28490

Disclosure Date: August 19, 2021 (last updated November 28, 2024)
In OWASP CSRFGuard through 3.1.0, CSRF can occur because the CSRF cookie may be retrieved by using only a session token.
Attacker Value
Unknown

CVE-2010-3300

Disclosure Date: June 22, 2021 (last updated November 29, 2024)
It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.
Attacker Value
Unknown

CVE-2021-23900

Disclosure Date: January 13, 2021 (last updated November 28, 2024)
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
Attacker Value
Unknown

CVE-2021-23899

Disclosure Date: January 13, 2021 (last updated November 28, 2024)
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.