666asd

Results 12 issues of 666asd

### Template / PR Information - CVE-2022-22965.yaml ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it blank if not...

Done

### Template / PR Information - Updated CVE-2022-33891.yaml - References: ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it...

![image](https://user-images.githubusercontent.com/16465586/42253975-f45155e8-7f76-11e8-9999-a8196f6cdd76.png) In the first pic, i used mmap to read file with python. the second is jython and JyNI. the string is truncated when i used JyNI.

bug

### Template / PR Information - Updated CVE-2021-42013.yaml - References: ### Template Validation I've validated this template locally? - [x] YES - [ ] NO #### Additional Details (leave it...

### Please describe your feature request: Can the fuzz functionality provide fuzzing based on keys? ### Describe the use case of this feature: For example, CVE-2018-1273 is a vulnerability that...

Type: Enhancement
DAST

Elements with the same XPath expression on different states are marked as the same element by the CandidateElementManager, but I believe they should be different elements.

### Issue description: ```yaml # Variable example using HTTP requests id: variables-example info: name: Variables Example author: pdteam severity: info http: - payloads: payload: - '{{interactsh-url}}' fuzzing: - part: query...

Type: Bug

The page contains such elements ``. It seems to be caused by a difference in the handling of "\" by the two functions. org.jsoup.select.QueryParser#consumeSubQuery org.jsoup.parser.TokenQueue#chompBalanced ![image](https://github.com/jhy/jsoup/assets/16465586/e8e9dff7-5d75-4426-97b1-2a94870227cd) ![image](https://github.com/jhy/jsoup/assets/16465586/dc0e6859-c26f-4f18-b568-6fa1ccd79fb7) ![image](https://github.com/jhy/jsoup/assets/16465586/414b178c-23d0-4c25-ac19-23a4e89b9c86)