<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Divakar</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Divakar"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Divakar"/>
		<updated>2026-05-08T23:52:21Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:KateHartmann&amp;diff=164173</id>
		<title>User talk:KateHartmann</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:KateHartmann&amp;diff=164173"/>
				<updated>2013-12-03T06:38:00Z</updated>
		
		<summary type="html">&lt;p&gt;Divakar: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Header text !! Header text !! Header text&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Image:468x60_doorhandle_v1.gif|http://www.acunetix.com/vulnerability-scanner/download.htm‎]][[Image:Bh12usa_468x60.png‎|www.blackhat.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Because of [https://www.owasp.org/index.php?title=Category:Sensitive_Data_Protection_Vulnerability&amp;amp;diff=prev&amp;amp;oldid=89209 this edit], I suggest blocking [[User:Frank Alexander|Frank Alexander]]. [[User:Forest Monsen|Forest Monsen]] 18:59, 4 April 2012 (UTC)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am getting errors when I am trying to generate thumbnails. The error message is:&lt;br /&gt;
&lt;br /&gt;
Error creating thumbnail: Invalid thumbnail parameters&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
&lt;br /&gt;
File:UseAndMisuseCase.png&lt;br /&gt;
File:Session_riding.png&lt;br /&gt;
&lt;br /&gt;
Could you get someone to look into it?&lt;br /&gt;
&lt;br /&gt;
--[[User:Michael Boman|Michael Boman]] 19:20, 3 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Hi. We want Provide owasp top 10 Movie by us . cheak it plz. ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
we are information security education center.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
company name is i2SEC(international information security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our company provides security consulting and training .&lt;br /&gt;
&lt;br /&gt;
we have long had an interest in owasp.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After we clarified that no video files related to &amp;quot;owasp top 10&amp;quot; are provided by websites, we were disappointed somehow.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Therefore, we’d like to produce a video file which shows certain flaws of &amp;quot;owasp top 10&amp;quot; catagories.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We already had been experienced in producing &amp;quot;2007 owasp top 10&amp;quot; video files, in addition, are able to translate them to multi-national languages including English.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact us after reviewing our suggestions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will transfer the &amp;quot;2007 owasp top 10&amp;quot; video file to you through the messenger if you need to check it.&lt;br /&gt;
&lt;br /&gt;
== Sample website ==&lt;br /&gt;
&lt;br /&gt;
Hi Team, Is there any sample website where we can perform security test using ZAP tool ?&lt;br /&gt;
&lt;br /&gt;
== How to detect vulnerability in the url(query string). ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
   I am new bee to security issues. &lt;br /&gt;
Recently i faced one issue. &lt;br /&gt;
The issue is, I have an URL(querysting) in that I find an event like &amp;quot;onbegin&amp;quot; &lt;br /&gt;
Which is injected by the attacker. &lt;br /&gt;
Currently I am using Antisamy tool to detect vulnerabilities. &lt;br /&gt;
In my case I have event(onbegin) only without tag related information in the url so Antisamy unable to detect vulnerabilities.&lt;br /&gt;
Now my requirement is I want to detect attacher code in the URL which is dont having tag related information. &lt;br /&gt;
If any specialized tools for this requirement please suggest me. &lt;br /&gt;
Can you suggest any solution for my issue.&lt;br /&gt;
&lt;br /&gt;
Regards,&lt;br /&gt;
Divakar&lt;br /&gt;
mail to: divakar161986@gmail.com&lt;/div&gt;</summary>
		<author><name>Divakar</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:KateHartmann&amp;diff=164172</id>
		<title>User talk:KateHartmann</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:KateHartmann&amp;diff=164172"/>
				<updated>2013-12-03T06:34:20Z</updated>
		
		<summary type="html">&lt;p&gt;Divakar: /* How to detect vulnerability in the url(query string). */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Header text !! Header text !! Header text&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Image:468x60_doorhandle_v1.gif|http://www.acunetix.com/vulnerability-scanner/download.htm‎]][[Image:Bh12usa_468x60.png‎|www.blackhat.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Because of [https://www.owasp.org/index.php?title=Category:Sensitive_Data_Protection_Vulnerability&amp;amp;diff=prev&amp;amp;oldid=89209 this edit], I suggest blocking [[User:Frank Alexander|Frank Alexander]]. [[User:Forest Monsen|Forest Monsen]] 18:59, 4 April 2012 (UTC)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am getting errors when I am trying to generate thumbnails. The error message is:&lt;br /&gt;
&lt;br /&gt;
Error creating thumbnail: Invalid thumbnail parameters&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
&lt;br /&gt;
File:UseAndMisuseCase.png&lt;br /&gt;
File:Session_riding.png&lt;br /&gt;
&lt;br /&gt;
Could you get someone to look into it?&lt;br /&gt;
&lt;br /&gt;
--[[User:Michael Boman|Michael Boman]] 19:20, 3 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Hi. We want Provide owasp top 10 Movie by us . cheak it plz. ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
we are information security education center.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
company name is i2SEC(international information security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our company provides security consulting and training .&lt;br /&gt;
&lt;br /&gt;
we have long had an interest in owasp.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After we clarified that no video files related to &amp;quot;owasp top 10&amp;quot; are provided by websites, we were disappointed somehow.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Therefore, we’d like to produce a video file which shows certain flaws of &amp;quot;owasp top 10&amp;quot; catagories.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We already had been experienced in producing &amp;quot;2007 owasp top 10&amp;quot; video files, in addition, are able to translate them to multi-national languages including English.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact us after reviewing our suggestions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will transfer the &amp;quot;2007 owasp top 10&amp;quot; video file to you through the messenger if you need to check it.&lt;br /&gt;
&lt;br /&gt;
== Sample website ==&lt;br /&gt;
&lt;br /&gt;
Hi Team, Is there any sample website where we can perform security test using ZAP tool ?&lt;br /&gt;
&lt;br /&gt;
== How to detect vulnerability in the url(query string). ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
   I am new bee to security issues. Recently i faced one issue. The issue is, I have an URL(querysting) in that I find an event like &amp;quot;onbegin&amp;quot; Which is injected by the attacker. Currently I am using Antisamy tool to detect vulnerabilities. In my case I have event(onbegin) only without tag related information in the url so Antisamy unable to detect vulnerabilities.now my requirement is I want to detect attacher code in the URL which is dont having tag related information. If any specialized tools for this requirement please suggest me. can you suggest any solution for my issue.&lt;br /&gt;
&lt;br /&gt;
Regards,&lt;br /&gt;
Divakar&lt;br /&gt;
mail to: divakar161986@gmail.com&lt;/div&gt;</summary>
		<author><name>Divakar</name></author>	</entry>

	</feed>