-
## Describe the bug
I ran dalfox on the following vulnerable application:
```
const express = require('express')
const app = express()
const port = 3000
app.get('/', (req, res) => {
res.se…
-
```
Depending on how your webserver is set up some scanners may report that all
pages have a low level vulnerability as the session cookie isnt set with
httponly.
The following bit of code in each j…
-
Hi @xnl-h4ck3r,
I have a suggestion to make knoxnl Burp Piper even more user-friendly and efficient.
Currently, knoxnl Burp Piper allows us to send individual HTTP requests for analysis. However, …
-
Hi,
I've just test this one into the following test scenario:
1. I've installed the DVWA application over a Windows 2003 Server virtual machine.
2. I've chosen the XSS reflected from the exercises d…
-
```
Depending on how your webserver is set up some scanners may report that all
pages have a low level vulnerability as the session cookie isnt set with
httponly.
The following bit of code in each j…
-
https://18f.slack.com/archives/compliance-toolkit/p1461964310000617 and https://18f.slack.com/archives/dap/p1461963187000393
Static sites have a different security profile than a dynamic one. We shou…
-
Checkmarx, code scanning tool, found security vulnerability in materialize.js.
## Expected Behavior
href value should be sanitized or validated
## Current Behavior
Method "parseHTML" of mater…
-
## Question
Your questions
When I scan a router login page it doesn't show any exploitations availabe
but I know that the login page is epxloitable because it is susceptible to XSS during a mitma
…
-
Can you add to the readme how to install on linux?
-
```
Depending on how your webserver is set up some scanners may report that all
pages have a low level vulnerability as the session cookie isnt set with
httponly.
The following bit of code in each j…