Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown
CVE-2020-13973
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
0
Attacker Value
Unknown
CVE-2019-1020007
Disclosure Date: July 29, 2019 (last updated November 27, 2024)
Dependency-Track before 3.5.1 allows XSS.
0
Attacker Value
Unknown
CVE-2018-16384
Disclosure Date: September 03, 2018 (last updated November 27, 2024)
A SQL injection bypass (aka PL1 bypass) exists in OWASP ModSecurity Core Rule Set (owasp-modsecurity-crs) through v3.1.0-rc3 via {`a`b} where a is a special function name (such as "if") and b is the SQL statement to be executed.
0
Attacker Value
Unknown
CVE-2018-12036
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames.
0
Attacker Value
Unknown
CVE-2013-5960
Disclosure Date: September 30, 2013 (last updated October 05, 2023)
The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0.1 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an attack against the intended cipher mode in a non-default configuration, a different vulnerability than CVE-2013-5679.
0
Attacker Value
Unknown
CVE-2013-5679
Disclosure Date: September 30, 2013 (last updated October 05, 2023)
The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an attack against authenticity in the default configuration, involving a null MAC and a zero MAC length.
0
Attacker Value
Unknown
CVE-2011-4457
Disclosure Date: November 17, 2011 (last updated October 04, 2023)
OWASP HTML Sanitizer (aka owasp-java-html-sanitizer) before 88, when JavaScript is disabled, allows user-assisted remote attackers to obtain potentially sensitive information via a crafted FORM element within a NOSCRIPT element.
0
Attacker Value
Unknown
CVE-2007-4385
Disclosure Date: August 17, 2007 (last updated October 04, 2023)
OWASP Stinger before 2.5 allows remote attackers to bypass input validation routines by using multipart encoded requests instead of form-urlencoded requests. NOTE: this might be used to expose vulnerabilities in applications that would otherwise be protected by the validation routines.
0
Attacker Value
Unknown
CVE-2006-3841
Disclosure Date: July 25, 2006 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in WebScarab before 20060718-1904, when used with Microsoft Internet Explorer 6 SP2 or Konqueror 3.5.3, allows remote attackers to inject arbitrary web script or HTML via the URL, which is not sanitized before being returned in an error message when WebScarab is not able to access the URL.
0