-
When I intend to recreate a xss attack, tanner.log recognize and tag the attack correctly but tanner api returns "attack_types": [].
-
```
$ curl -H "x-format-output: txt-matched-rules" http://sandbox.coreruleset.org/ -d 'foo=console.log(msg)'
-- no output --
$ curl -H "x-format-output: txt-matched-rules" http://sandbox.corerule…
-
Late report on v7.10.2 at [SETI@Home](https://setiathome.berkeley.edu/forum_thread.php?id=82973&postid=1937231#1937231).
> I have some issue with boinc 7.10.2 on linux when running on a computer wi…
-
### Description
### How to reproduce the misbehavior (-> curl call)
`curl -H "x-format-output: txt-matched-rules" "https://sandbox.coreruleset.org/?bla=time%20express"`
however "time" (which …
-
## Environment
- `chromium` Version: `126.0.0`
- `playwright-core` Version: `1.45.2`
- Node.js Version: `nodejs20.x`
- Lambda Runtime: `nodejs20.x`
## Expected Behavior
Launch the browser,…
-
when trying
`
const attackDetection = require('xss-attack-detection');
const xss_detect = new attackDetection.xssAttackDetection();
xss_detect.detect("{}");
`
get following error:
`Uncaugh…
-
### Description
I've encountered some shell false positives for 932260 (PL1) , 932236 and 932239 (PL2) for commands like sudo, df, fd, and grc.
Some of these I'm obviously familiar with, but…
-
### Preconditions (*)
1. Run Magento with Nginx + Modsecurity with Core OWASP rules enabled Or Run Cloudflare with Managed OWASP rules enabled.
### Steps to reproduce (*)
1. Goto any plac…
-
### What happened?
I have nginx logs sent to journald, which then writes these to /var/log/syslog. In my acquis.yaml I have 2 datasources, each pointing to /var/log/syslog. However, the type of one…
-
To help us diagnose issues efficiently, please include:
[x] A short but descriptive title
[x] A detailed description of the problem including relevant software versions and steps to reproduce
O…