Skip to content

Commit

Permalink
Merge pull request #1606 from zapbot/update-site-content
Browse files Browse the repository at this point in the history
Update site content
  • Loading branch information
kingthorin authored Nov 26, 2024
2 parents 10557a8 + 6c1e22a commit a0dca8c
Show file tree
Hide file tree
Showing 108 changed files with 5,416 additions and 20 deletions.
42 changes: 42 additions & 0 deletions alerttags/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -673,6 +673,48 @@ <h1 class="text--white">Alert Tags</h1>
</tr>


<tr>
<td><a href="/alerttags/policy_api/">POLICY_API</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_cicd/">POLICY_DEV_CICD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_full/">POLICY_DEV_FULL</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_dev_std/">POLICY_DEV_STD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_qa_full/">POLICY_QA_FULL</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_qa_std/">POLICY_QA_STD</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/policy_sequence/">POLICY_SEQUENCE</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/alerttags/test_timing/">TEST_TIMING</a></td>
<td><a href=""></a></td>
Expand Down
49 changes: 49 additions & 0 deletions alerttags/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -630,6 +630,55 @@
<guid>/alerttags/owasp_2021_a10/</guid>
<description></description>
</item>
<item>
<title>POLICY_API</title>
<link>/alerttags/policy_api/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_api/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_CICD</title>
<link>/alerttags/policy_dev_cicd/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_cicd/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_FULL</title>
<link>/alerttags/policy_dev_full/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_full/</guid>
<description></description>
</item>
<item>
<title>POLICY_DEV_STD</title>
<link>/alerttags/policy_dev_std/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_dev_std/</guid>
<description></description>
</item>
<item>
<title>POLICY_QA_FULL</title>
<link>/alerttags/policy_qa_full/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_qa_full/</guid>
<description></description>
</item>
<item>
<title>POLICY_QA_STD</title>
<link>/alerttags/policy_qa_std/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_qa_std/</guid>
<description></description>
</item>
<item>
<title>POLICY_SEQUENCE</title>
<link>/alerttags/policy_sequence/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/alerttags/policy_sequence/</guid>
<description></description>
</item>
<item>
<title>TEST_TIMING</title>
<link>/alerttags/test_timing/</link>
Expand Down
12 changes: 12 additions & 0 deletions alerttags/owasp_2017_a07/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -157,6 +157,18 @@ <h4><a href="https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scrip
</tr>


<tr>
<td><a href="/docs/alerts/40016/">Cross Site Scripting (Persistent) - Prime</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40017/">Cross Site Scripting (Persistent) - Spider</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40012/">Cross Site Scripting (Reflected)</a></td>
<td><a href=""></a></td>
Expand Down
14 changes: 14 additions & 0 deletions alerttags/owasp_2017_a07/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,20 @@
<guid>/docs/alerts/40014/</guid>
<description>&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&amp;rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology.&#xA;When an attacker gets a user&amp;rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.&lt;/p&gt;</description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Prime</title>
<link>/docs/alerts/40016/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40016/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Spider</title>
<link>/docs/alerts/40017/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40017/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Reflected)</title>
<link>/docs/alerts/40012/</link>
Expand Down
12 changes: 12 additions & 0 deletions alerttags/owasp_2021_a03/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,18 @@ <h4><a href="https://owasp.org/Top10/A03_2021-Injection/">https://owasp.org/Top1
</tr>


<tr>
<td><a href="/docs/alerts/40016/">Cross Site Scripting (Persistent) - Prime</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40017/">Cross Site Scripting (Persistent) - Spider</a></td>
<td><a href=""></a></td>
</tr>


<tr>
<td><a href="/docs/alerts/40012/">Cross Site Scripting (Reflected)</a></td>
<td><a href=""></a></td>
Expand Down
14 changes: 14 additions & 0 deletions alerttags/owasp_2021_a03/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,20 @@
<guid>/docs/alerts/40014/</guid>
<description>&lt;p&gt;Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user&amp;rsquo;s browser instance. A browser instance can be a standard web browser client, or a browser object embedded in a software product such as the browser within WinAmp, an RSS reader, or an email client. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX, Java, Flash, or any other browser-supported technology.&#xA;When an attacker gets a user&amp;rsquo;s browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.&lt;/p&gt;</description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Prime</title>
<link>/docs/alerts/40016/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40016/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Persistent) - Spider</title>
<link>/docs/alerts/40017/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/docs/alerts/40017/</guid>
<description></description>
</item>
<item>
<title>Cross Site Scripting (Reflected)</title>
<link>/docs/alerts/40012/</link>
Expand Down
Loading

0 comments on commit a0dca8c

Please sign in to comment.