The OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 allows remote attackers to bypass cryptographic protection
Reporter | Title | Published | Views | Family All 22 |
---|---|---|---|---|
![]() | Default configuration | 30 Sep 201317:09 | – | prion |
![]() | Default configuration | 30 Sep 201317:09 | – | prion |
![]() | CVE-2013-5679 | 30 Sep 201317:09 | – | cve |
![]() | CVE-2013-5960 | 30 Sep 201317:09 | – | cve |
![]() | Missing Cryptographic Step in OWASP Enterprise Security API for Java | 17 May 202203:56 | – | github |
![]() | Missing Cryptographic Step in OWASP Enterprise Security API for Java | 14 May 202201:37 | – | github |
![]() | Missing Cryptographic Step in OWASP Enterprise Security API for Java | 17 May 202203:56 | – | osv |
![]() | Missing Cryptographic Step in OWASP Enterprise Security API for Java | 14 May 202201:37 | – | osv |
![]() | OWASP ESAPI Security Advisory: MAC Bypass in ESAPI Symmetric Encryption | 3 Oct 201300:00 | – | securityvulns |
![]() | Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 3 Oct 201300:00 | – | securityvulns |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo