-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **Content Security Policy (CSP) Header Not Set** [10038] total:…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **Content Security Policy (CSP) Header Not Set** [10038] total:…
-
**Is your feature request related to a problem? Please describe.**
We are looking at increasing the Test coverage for the project for its stability so this task is to add junit tests for https://gith…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **Content Security Policy (CSP) Header Not Set** [10038] total:…
-
[Suggested description]
Tbed was discovered to contain a SQL injection vulnerability via the searchname parameter.
[Vulnerability Type]
SQLi
[Vendor of Product]
https://github.com/Hello-hao/T…
Tyaoo updated
9 months ago
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **SQL Injection** [40018] total: 1:
- [http://localhost:500…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **Content Security Policy (CSP) Header Not Set** [10038] total:…
-
### **Description**
SQL Injection & Insufficiently Random Values vulnerability
### **Repro Steps**
- Use [Mobile Security Framework Mobsf](https://github.com/MobSF/Mobile-Security-Framework-M…
-
SQL injection again and again
-
Example: https://github.com/huytd/agar.io-clone/blob/master/src/server/server.js#L367