<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OWASP_2025_A03 on ZAP</title>
    <link>/alerttags/owasp_2025_a03/</link>
    <description>Recent content in OWASP_2025_A03 on ZAP</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="/alerttags/owasp_2025_a03/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Heartbleed OpenSSL Vulnerability</title>
      <link>/docs/alerts/20015/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/20015/</guid>
      <description>&lt;p&gt;The TLS implementation in OpenSSL 1.0.1 before 1.0.1g does not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, potentially disclosing sensitive information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Log4Shell (CVE-2021-44228)</title>
      <link>/docs/alerts/40043-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/40043-1/</guid>
      <description>&lt;p&gt;Apache Log4j2 &amp;lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Log4Shell (CVE-2021-45046)</title>
      <link>/docs/alerts/40043-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/40043-2/</guid>
      <description>&lt;p&gt;It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Remote Code Execution - CVE-2012-1823</title>
      <link>/docs/alerts/20018/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/20018/</guid>
      <description>&lt;p&gt;Some PHP versions, when configured to run using CGI, do not correctly handle query strings that lack an unescaped &amp;ldquo;=&amp;rdquo; character, enabling arbitrary code execution. In this case, an operating system command was caused to be executed on the web server, and the results were returned to the web browser.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Remote Code Execution - Shell Shock</title>
      <link>/docs/alerts/10048-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/10048-1/</guid>
      <description>&lt;p&gt;The server is running a version of the Bash shell that allows remote attackers to execute arbitrary code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Remote Code Execution - Shell Shock</title>
      <link>/docs/alerts/10048-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/10048-2/</guid>
      <description>&lt;p&gt;The server is running a version of the Bash shell that allows remote attackers to execute arbitrary code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Remote Code Execution (React2Shell)</title>
      <link>/docs/alerts/40048/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/40048/</guid>
      <description>&lt;p&gt;The server is running Next.js and vulnerable versions of React Server Components with Next.js which allow remote attackers to execute arbitrary code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Script Served From Malicious Domain (polyfill)</title>
      <link>/docs/alerts/10115-1/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/10115-1/</guid>
      <description>&lt;p&gt;The page includes one or more script files loaded from one of the &amp;lsquo;polyfill&amp;rsquo; domains.&#xA;These are not associated with the polyfill.js library and are known to serve malicious content.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Script Served From Malicious Domain (polyfill)</title>
      <link>/docs/alerts/10115-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/10115-2/</guid>
      <description>&lt;p&gt;The page includes one or more script which appear to include a reference to one of the &amp;lsquo;polyfill&amp;rsquo; domains.&#xA;These are not associated with the polyfill.js library and are known to serve malicious content.&#xA;You should check to see if it is a safe reference (for example in a comment) or whether the script is loading content from that domain.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spring4Shell</title>
      <link>/docs/alerts/40045/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/40045/</guid>
      <description>&lt;p&gt;The application appears to be vulnerable to CVE-2022-22965 (otherwise known as Spring4Shell) - remote code execution (RCE) via data binding.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Text4shell (CVE-2022-42889)</title>
      <link>/docs/alerts/40047/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/40047/</guid>
      <description>&lt;p&gt;Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerable JS Library</title>
      <link>/docs/alerts/10003/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/alerts/10003/</guid>
      <description>&lt;p&gt;The identified library appears to be vulnerable.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
