-
Updated
Apr 17, 2022 - Python
owasp
Here are 485 public repositories matching this topic...
-
Updated
Mar 20, 2022
-
Updated
Apr 17, 2022 - JavaScript
-
Updated
Apr 16, 2022 - Go
-
Updated
Mar 31, 2022 - PHP
Onekongpc
What and where?
Please give the broken URL. Where is the link located?
Would you like to be assigned to this issue?
Check the box if you will submit a PR to fix this issue. Please read CONTRIBUTING.md.
-KONG [ ] Assign me, please!
-
Updated
Feb 5, 2022 - Ruby
-
Updated
Apr 16, 2022 - Go
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info
-
Updated
Jan 29, 2022 - Python
-
Updated
Apr 4, 2022 - JavaScript
-
Updated
Apr 17, 2022 - HTML
Description
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
Code
import org.apache.commons.beanutils.BeanUtils;
public-
Updated
Apr 15, 2022 - HTML
-
Updated
Apr 12, 2022 - JavaScript
-
Updated
Apr 17, 2022 - C
-
Updated
Mar 10, 2022 - TeX
-
Updated
Dec 1, 2021
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
Description
With a Nextcloud installation and activated Nextcloud-exclusion-rules their is a false positive alarm of rule "920470" when a calendar entry is changed in the web-interface. (I think Rule "9003330" should prevent this but didn't work, at least for me)
I tried to change rule 9003330 to phase:1 (didn't solve the Problem)
Current workaround for me is to add "ctl:ruleRemoveByI
-
Updated
Jul 11, 2019
-
Updated
Mar 19, 2022 - Raku
-
Updated
Apr 10, 2022 - PHP
-
Updated
Apr 15, 2022 - Go
I just finished dealing with auto-migrated issues for this article, it could definitely use some content updates:
https://github.com/OWASP/www-community/blob/master/pages/HttpOnly.md it still talks about old versions of IE and Opera.
This article includes an extensive table that needs re-working after the auto-migration as well (which I did not tackle).
Is Opera even relevant in 2020? Do
sim swapping
Improve this page
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
I have tried to use (env) variables in my YAML file for the automation framework, but it looks like variables only work in the
env.ctxsection of that YAML.Describe the solution you'd like
It would be nice if I could write a YAML file like so: