Vulnerabilities (CVE)

Filtered by vendor Owasp Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24891 1 Owasp 1 Enterprise Security Api 2022-07-25 4.3 MEDIUM 6.1 MEDIUM
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
CVE-2010-3300 1 Owasp 1 Enterprise Security Api For Java 2021-06-25 4.3 MEDIUM 5.9 MEDIUM
It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.
CVE-2020-13973 1 Owasp 1 Json-sanitizer 2020-06-12 4.3 MEDIUM 6.1 MEDIUM
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
CVE-2019-1020007 1 Owasp 1 Dependency-track 2020-02-13 3.5 LOW 5.4 MEDIUM
Dependency-Track before 3.5.1 allows XSS.