-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **SQL Injection** [40018] total: 1:
- [http://localhost:500…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **SQL Injection** [40018] total: 1:
- [http://localhost:500…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **SQL Injection** [40018] total: 1:
- [http://localhost:500…
-
- Site: [http://127.0.0.1:9090](http://127.0.0.1:9090)
**New Alerts**
- **CSP: Wildcard Directive** [10055] total: 2:
- [http://127.0.0.1:9090/robots.txt](http://127.0.0.1:9090/robots.txt)
…
-
Hi,
I am getting some XSS Reflected and persistent alerts generated when a .xls or .pdf file contains unsantised XSS injection strings. I do not want to add an alert filter because it is an .asp p…
-
### The Feature
```
curl --location 'http://0.0.0.0:4000/chat/completions' \
--header 'Content-Type: application/json' \
--data '{
"model": "gpt-4o",
"metadata": {
"guardrails": {"promp…
-
- Site: [https://owasp.org](https://owasp.org)
**New Alerts**
- **PII Disclosure** [10062] total: 3:
- [https://owasp.org/projects/leaders/](https://owasp.org/projects/leaders/)
- [https:…
-
Our app requires all requests to be proxied, including the tracker requests; the proxy endpoint requires custom headers. Because tracking requests are built in URLSessionDispatcher, we created a cust…
-
- Site: [https://localhost:5000](https://localhost:5000)
- Site: [http://localhost:5000](http://localhost:5000)
**New Alerts**
- **SQL Injection** [40018] total: 1:
- [http://localhost:500…
-
Key points:
- https://www.exploit-db.com/exploits/41239 (Zoneminder 1.29/1.30 - Cross-Site Scripting / SQL Injection / Session Fixation / Cross-Site Request Forgery)
- Use sqlmap