+
+
diff --git a/alerttags/cwe-215/index.xml b/alerttags/cwe-215/index.xml
new file mode 100644
index 0000000000..01cdf1b26f
--- /dev/null
+++ b/alerttags/cwe-215/index.xml
@@ -0,0 +1,18 @@
+
+
+
+ CWE-215 on ZAP
+ /alerttags/cwe-215/
+ Recent content in CWE-215 on ZAP
+ Hugo
+ en-us
+
+
+ Spring Actuator Information Leak
+ /docs/alerts/40042/
+ Mon, 01 Jan 0001 00:00:00 +0000
+ /docs/alerts/40042/
+ <p>Spring Actuator for Health is enabled and may reveal sensitive information about this application. Spring Actuators can be used for real monitoring purposes, but should be used with caution as to not expose too much information about the application or the infrastructure running it.</p>
+
+
+
diff --git a/alerttags/cwe-642/index.html b/alerttags/cwe-642/index.html
index 5700997a0d..0114a702c0 100644
--- a/alerttags/cwe-642/index.html
+++ b/alerttags/cwe-642/index.html
@@ -173,6 +173,12 @@
diff --git a/alerttags/cwe-642/index.xml b/alerttags/cwe-642/index.xml
index 3929438163..0873ab7099 100644
--- a/alerttags/cwe-642/index.xml
+++ b/alerttags/cwe-642/index.xml
@@ -21,6 +21,13 @@
/docs/alerts/10032-2/<p>The following emails were found being serialized in the viewstate field:</p>
+
+ Insecure JSF ViewState
+ /docs/alerts/90001/
+ Mon, 01 Jan 0001 00:00:00 +0000
+ /docs/alerts/90001/
+ <p>The response at the following URL contains a ViewState value that has no cryptographic protections.</p>
+ Old Asp.Net Version in Use
/docs/alerts/10032-3/
diff --git a/alerttags/cwe-643/index.html b/alerttags/cwe-643/index.html
new file mode 100644
index 0000000000..835b09194d
--- /dev/null
+++ b/alerttags/cwe-643/index.html
@@ -0,0 +1,232 @@
+
+
+
+
+
+
+
+
+
+ ZAP – CWE-643
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/alerttags/cwe-643/index.xml b/alerttags/cwe-643/index.xml
new file mode 100644
index 0000000000..666dbcd310
--- /dev/null
+++ b/alerttags/cwe-643/index.xml
@@ -0,0 +1,18 @@
+
+
+
+ CWE-643 on ZAP
+ /alerttags/cwe-643/
+ Recent content in CWE-643 on ZAP
+ Hugo
+ en-us
+
+
+ XPath Injection
+ /docs/alerts/90021/
+ Mon, 01 Jan 0001 00:00:00 +0000
+ /docs/alerts/90021/
+ <p>XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.</p>
+
+
+
diff --git a/alerttags/cwe-91/index.html b/alerttags/cwe-91/index.html
new file mode 100644
index 0000000000..982e3efed7
--- /dev/null
+++ b/alerttags/cwe-91/index.html
@@ -0,0 +1,232 @@
+
+
+
+
+
+
+
+
+
+ ZAP – CWE-91
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+