-
Updated
May 17, 2021 - Python
owasp
Here are 393 public repositories matching this topic...
-
Updated
Nov 11, 2020
-
Updated
May 13, 2021 - Python
-
Updated
May 17, 2021 - Go
-
Updated
May 16, 2021 - TypeScript
-
Updated
Apr 12, 2021 - PHP
-
Updated
Mar 11, 2021 - Ruby
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
-
Updated
May 6, 2021 - Go
-
Updated
Dec 30, 2020 - Python
Safety parser relly on a DB of vulnerabilities with CVE infos. This databases is upgraded/modified every month.
This pb is that our unit tests relly on this changing file.
We need to do one of these options:
- fix the DB file for unit tests
- remove completely this feature and wait that the CVE info come from the report (I pushed a pull request upstream to have CVE directly in the JSON rep
Description
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
Code
import org.apache.commons.beanutils.BeanUtils;
public-
Updated
May 13, 2021 - Python
-
Updated
May 9, 2021 - JavaScript
-
Updated
May 17, 2021 - C
-
Updated
May 11, 2021 - Python
-
Updated
Oct 1, 2020
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
May 20, 2020 - Perl 6
-
Updated
Feb 24, 2021 - Python
-
Updated
May 17, 2021 - Java
-
Updated
Mar 22, 2021
-
Updated
Aug 24, 2020 - CSS
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
Improve this page
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
PoC: explore (spider) Juice Shop.
This rule will raise 3 alerts for Java detcted but in each case its matching
classin a JavaScript file.The rule shouldnt try to perform this match in JavaScript files, maybe not do any of the source code checks in these?
Code: https://github.com/zaproxy/zap-extensions/blob/master/addOns/pscanrulesAlpha/src/main/java/org/zaproxy/zap/extension/pscanrule