<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CWE-451 on ZAP</title>
    <link>/alerttags/cwe-451/</link>
    <description>Recent content in CWE-451 on ZAP</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="/alerttags/cwe-451/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>DOM-based Link Manipulation (taint flow)</title>
      <link>/docs/alerts/220009-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/220009-2/</guid>
      <description>&lt;p&gt;Detects DOM code that rewrites link destinations (href attributes) with attacker-controlled data. Manipulated links can mislead users into visiting malicious targets even if navigation is not forced automatically.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK SAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>IFrame content injection via srcdoc</title>
      <link>/docs/alerts/210012-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/210012-2/</guid>
      <description>&lt;p&gt;Tainted HTML assigned to iframe.srcdoc, enabling DOM-based XSS inside the frame.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK IAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>IFrame navigation via src</title>
      <link>/docs/alerts/210012-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/210012-1/</guid>
      <description>&lt;p&gt;Tainted URL assigned to iframe.src, causing navigation to untrusted content.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK IAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>Review assignments to href/src/action</title>
      <link>/docs/alerts/220009-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/220009-1/</guid>
      <description>&lt;p&gt;Detects DOM code that rewrites link destinations (href attributes) with attacker-controlled data. Manipulated links can mislead users into visiting malicious targets even if navigation is not forced automatically.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK SAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>Untrusted DOM data into createHTMLDocument</title>
      <link>/docs/alerts/220010-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/220010-2/</guid>
      <description>&lt;p&gt;Detects untrusted DOM data being written into form metadata (formAction/target/method/value/placeholder), inline style surfaces (style/cssText/background*), document.title, history state, or createHTMLDocument — mutations that influence UI/navigation state without covering classic href/src/action sinks already handled elsewhere.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK SAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>Untrusted DOM data into navigation-adjacent sinks</title>
      <link>/docs/alerts/220010-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/220010-1/</guid>
      <description>&lt;p&gt;Detects untrusted DOM data being written into form metadata (formAction/target/method/value/placeholder), inline style surfaces (style/cssText/background*), document.title, history state, or createHTMLDocument — mutations that influence UI/navigation state without covering classic href/src/action sinks already handled elsewhere.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK SAST Module&lt;/p&gt;</description>
    </item>
    <item>
      <title>Untrusted DOM data into UI mutation sinks</title>
      <link>/docs/alerts/220010-3/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/220010-3/</guid>
      <description>&lt;p&gt;Detects untrusted DOM data being written into form metadata (formAction/target/method/value/placeholder), inline style surfaces (style/cssText/background*), document.title, history state, or createHTMLDocument — mutations that influence UI/navigation state without covering classic href/src/action sinks already handled elsewhere.&lt;/p&gt;&#xA;&lt;p&gt;Generated by OWASP PTK SAST Module&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
