666asd
666asd
### Template / PR Information - CVE-2022-22965.yaml ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it blank if not...
### Template / PR Information - Updated CVE-2022-33891.yaml - References: ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it...
 In the first pic, i used mmap to read file with python. the second is jython and JyNI. the string is truncated when i used JyNI.
### Template / PR Information - Updated CVE-2021-42013.yaml - References: ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it...
### Please describe your feature request: Can the fuzz functionality provide fuzzing based on keys? ### Describe the use case of this feature: For example, CVE-2018-1273 is a vulnerability that...
Elements with the same XPath expression on different states are marked as the same element by the CandidateElementManager, but I believe they should be different elements.
### Issue description: ```yaml # Variable example using HTTP requests id: variables-example info: name: Variables Example author: pdteam severity: info http: - payloads: payload: - '{{interactsh-url}}' fuzzing: - part: query...
The page contains such elements ``. It seems to be caused by a difference in the handling of "\" by the two functions. org.jsoup.select.QueryParser#consumeSubQuery org.jsoup.parser.TokenQueue#chompBalanced   