Vulnerabilities tagged "web"

Log Injection in SAP/Infrabox

**Tl;dr** /api/log endpoint writes to a log file with attacker controlled data. Also attacker can write to any *.log file.
 

Duo Two-factor Authentication Bypass

Two 2FA bypassing, one based on auth state not being tied to the user's session, the other involved swapping a transaction id to trick the server into thinking the attacker's 2FA acceptance was the victim's.