Tracking Changes Made from 2013 to 2017 OWASP Reports
OWASP Top 10: 2017 Edition in Comparison with 2013 Edition Image Source: https://owasp.org/www-pdf-archive/OWASP_Top_10-2017_%28en%29.pdf.pdf Major Changes Introduced from 2013 to 2017 Change
OWASP Top 10: 2017 Edition in Comparison with 2013 Edition Image Source: https://owasp.org/www-pdf-archive/OWASP_Top_10-2017_%28en%29.pdf.pdf Major Changes Introduced from 2013 to 2017 Change
Introducing the world’s first Distributed WAF on Multi-Cloud # SaaS Free WAF Prophaze WAF is a Native Cloud Web Application
Microsoft Edge on Android information disclosure [CVE-2021-26439] A vulnerability classified as problematic was found in Microsoft Edge on Android (Web
A vulnerability has been found in ZOLL Defibrillator Dashboard up to 2.1 (Forum Software) and classified as problematic. Affected by
A vulnerability was found in Google Android 8.1/9.0/10.0/11.0 (Smartphone Operating System). It has been declared as critical. This vulnerability affects
OWASP TOP 10 OWASP Top 10 Web Application Vulnerabilities’ Mitigation using Prophaze WAF Prophaze web application firewall (WAF) that protects
Financial Institutions Customers Adapt to Prophaze Architectures Prophaze assists them in switching to a streamlined and secure web application protection
Education Securing Education Sectors for Comprehensive Protection Prophaze offers protection against malicious activities in off/down hours and detecting bad IP
E-Commerce Prophaze WAF Safeguard Customer Data and Prevent Cyberattacks Prophaze WAF can be easily configurable in either blacklist/whitelist approaches which
Overview : Multiple vulnerabilities like Unprotected AJAX Action & Cross-Site Request Forgery reported in XCloner Affected Product(s) : versions before
Prototype Pollution Prototype Pollution is a vulnerability affecting JavaScript. Prototype Pollution refers to the ability to inject properties into existing
[vc_row][vc_column][vc_column_text] Overview : Fuji Electric V-Server Lite all versions prior to 4.0.9.0 contains a heap based buffer overflow. The buffer
[vc_row][vc_column][vc_column_text] Overview : The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to
[vc_row][vc_column][vc_column_text] Overview : Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package
[vc_row][vc_column][vc_column_text] Overview : The Spotfire library component of TIBCO Software Inc.’s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO
Overview : The EntityTokenSerializer class in Composite.dll is prone to unvalidated deserialization of wrapped BinaryFormatter payloads, leading to arbitrary remote
Overview : A logical error in bounds checking performed on vsock virtio descriptors can be used by a malicious guest
Overview : Vulnerable versions of ATTK may allow an attacker to place malicious files in the same directory, potentially leading
Overview : Cisco Aironet Access Points Unauthorized Access Vulnerability CWE-284 / CVE-2019-15260 A vulnerability in Cisco Aironet Access Points (APs) Software could
Overview : Moxa EDR 810 Series Improper Input Validation and Improper Access Control vulnerabilities Affected Product(s) : EDR-810: All versions
Overview : Cisco Firepower Management Center Remote Code Execution Vulnerability CWE-20 / CVE-2019-12689 A vulnerability in the web-based management interface
Overview : The security vulnerabilities detected in JetBrains products as follows Affected Product(s) : JetBrains YouTrack versions before 2019.1.52584. JetBrains
Overview : In WebAccess versions 8.4.1 and prior, multiple stack based buffer overflow vulnerabilities are detected by a lack of
LibreOffice was found to be prone to remote code execution vulnerability and also was affected with unauthorised access vulnerability. An