OWASP Broken Web Applications Project Tickets
Brought to you by:
chuckatsf
# | Summary▾ | Labels▾ | Component▾ | Severity▾ | |
---|---|---|---|---|---|
13 | Reflected XSS in http://owaspbwa/gtd-php/editList.php | GTD-PHP | Medium | ||
12 | Reflected XSS in http://owaspbwa/gtd-php/editChecklist.php | GTD-PHP | Medium | ||
11 | Internal Path Disclosure | AWStats | _Low | ||
10 | Open Redirect | AWStats | _Low | ||
9 | Malicious File Execution | WordPress | High | ||
8 | SQL Injection | WordPress | High | ||
7 | SQL Injection | WordPress | High | ||
6 | Command Injection | WordPress | High | ||
5 | Reflected XSS in http://owaspbwa/mono/simple-reflected-xss.aspx | Simple ASP.NET Forms | Medium | ||
4 | Reflected XSS in http://owaspbwa/vicnum/vicnum5.php | OWASP Vicnum | Medium | ||
3 | State Manipulation | OWASP Vicnum | High | ||
2 | Reflected XSS in http://owaspbwa/mandiant-struts-form-vulnerable/submitname.do | Mandiant Struts Forms | Medium | ||
1 | Reflected XSS in http://owaspbwa/vicnum/cgi-bin/vicnum1.pl | OWASP Vicnum | Medium |