Skip to content

Commit

Permalink
Update site content
Browse files Browse the repository at this point in the history
From:
zaproxy/zaproxy-website@c7ddf5e

Signed-off-by: zapbot <12745184+zapbot@users.noreply.github.com>
  • Loading branch information
zapbot committed Nov 26, 2024
1 parent 10557a8 commit 6c1e22a
Show file tree
Hide file tree
Showing 108 changed files with 5,416 additions and 20 deletions.
42 changes: 42 additions & 0 deletions alerttags/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -673,6 +673,48 @@ <h1 class="text--white">Alert Tags</h1>
</tr>


<tr>
<td><a href="/alerttags/policy_api/">POLICY_API</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_cicd/">POLICY_DEV_CICD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_full/">POLICY_DEV_FULL</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_std/">POLICY_DEV_STD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_qa_full/">POLICY_QA_FULL</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_qa_std/">POLICY_QA_STD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_sequence/">POLICY_SEQUENCE</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/test_timing/">TEST_TIMING</a></td>
<td><a href=""></a></td>
Expand Down
49 changes: 49 additions & 0 deletions alerttags/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -630,6 +630,55 @@
<guid>/alerttags/owasp_2021_a10/</guid>
<description></description>
</item>
<item>
<title>POLICY_API</title>
<link>/alerttags/policy_api/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_api/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_CICD</title>
<link>/alerttags/policy_dev_cicd/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_cicd/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_FULL</title>
<link>/alerttags/policy_dev_full/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_full/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_STD</title>
<link>/alerttags/policy_dev_std/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_std/</guid>
<description></description>
</item>
<item>
<title>POLICY_QA_FULL</title>
<link>/alerttags/policy_qa_full/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_qa_full/</guid>
<description></description>
</item>
<item>
<title>POLICY_QA_STD</title>
<link>/alerttags/policy_qa_std/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_qa_std/</guid>
<description></description>
</item>
<item>
<title>POLICY_SEQUENCE</title>
<link>/alerttags/policy_sequence/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_sequence/</guid>
<description></description>
</item>
<item>
<title>TEST_TIMING</title>
<link>/alerttags/test_timing/</link>
Expand Down
12 changes: 12 additions & 0 deletions alerttags/owasp_2017_a07/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -157,6 +157,18 @@ <h4><a href="https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scrip
</tr>


<tr>
<td><a href="/docs/alerts/40016/">Cross Site Scripting (Persistent) - Prime</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40017/">Cross Site Scripting (Persistent) - Spider</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40012/">Cross Site Scripting (Reflected)</a></td>
<td><a href=""></a></td>
Expand Down
14 changes: 14 additions & 0 deletions alerttags/owasp_2017_a07/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,20 @@
<guid>/docs/alerts/40014/</guid>
<description>&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&amp;rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology.&#xA;When an attacker gets a user&amp;rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.&lt;/p&gt;</description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Prime</title>
<link>/docs/alerts/40016/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40016/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Spider</title>
<link>/docs/alerts/40017/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40017/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Reflected)</title>
<link>/docs/alerts/40012/</link>
Expand Down
12 changes: 12 additions & 0 deletions alerttags/owasp_2021_a03/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,18 @@ <h4><a href="https://owasp.org/Top10/A03_2021-Injection/">https://owasp.org/Top1
</tr>


<tr>
<td><a href="/docs/alerts/40016/">Cross Site Scripting (Persistent) - Prime</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40017/">Cross Site Scripting (Persistent) - Spider</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40012/">Cross Site Scripting (Reflected)</a></td>
<td><a href=""></a></td>
Expand Down
14 changes: 14 additions & 0 deletions alerttags/owasp_2021_a03/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,20 @@
<guid>/docs/alerts/40014/</guid>
<description>&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&amp;rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology.&#xA;When an attacker gets a user&amp;rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.&lt;/p&gt;</description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Prime</title>
<link>/docs/alerts/40016/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40016/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Spider</title>
<link>/docs/alerts/40017/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40017/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Reflected)</title>
<link>/docs/alerts/40012/</link>
Expand Down
Loading

0 comments on commit 6c1e22a

Please sign in to comment.