package info (click to toggle)
python-vulndb 0.1.3-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,032 kB
  • sloc: python: 446; sh: 196; makefile: 2

Folder: en

d .. (parent)
d d rwxr-xr-x 4,096 description
d d rwxr-xr-x 4,096 fix
- - rw-r--r-- 473 1-allowed-http-methods.json
- - rw-r--r-- 447 10-common-sensitive-file.json
- - rw-r--r-- 397 11-cookie-set-for-parent-domain.json
- - rw-r--r-- 528 12-credit-card-number-disclosure.json
- - rw-r--r-- 760 13-cross-site-request-forgery.json
- - rw-r--r-- 267 14-cvs-svn-user-disclosure.json
- - rw-r--r-- 534 15-directory-listing.json
- - rw-r--r-- 239 16-e-mail-address-disclosure.json
- - rw-r--r-- 518 17-file-inclusion.json
- - rw-r--r-- 429 18-form-based-file-upload.json
- - rw-r--r-- 521 19-missing-strict-transport-security-header.json
- - rw-r--r-- 576 2-a-backdoor-file-exists-on-the-server.json
- - rw-r--r-- 467 20-misconfiguration-in-limit-directive-of-htaccess-file.json
- - rw-r--r-- 227 21-html-object.json
- - rw-r--r-- 438 22-httponly-cookie.json
- - rw-r--r-- 459 23-publicly-writable-directory.json
- - rw-r--r-- 546 24-insecure-client-access-policy.json
- - rw-r--r-- 443 25-insecure-cookie.json
- - rw-r--r-- 654 26-access-control-allow-origin-star.json
- - rw-r--r-- 557 27-insecure-cross-domain-policy-allow-access-from.json
- - rw-r--r-- 448 29-interesting-response.json
- - rw-r--r-- 545 3-backup-directory.json
- - rw-r--r-- 595 30-ldap-injection.json
- - rw-r--r-- 299 31-exposed-localstart-asp-page.json
- - rw-r--r-- 506 32-mixed-resource.json
- - rw-r--r-- 527 33-nosql-injection.json
- - rw-r--r-- 503 34-blind-nosql-injection-differential-analysis.json
- - rw-r--r-- 341 35-access-restriction-bypass-via-origin-spoof.json
- - rw-r--r-- 650 36-operating-system-command-injection.json
- - rw-r--r-- 319 38-password-field-with-auto-complete.json
- - rw-r--r-- 598 39-path-traversal.json
- - rw-r--r-- 540 4-backup-file.json
- - rw-r--r-- 463 40-private-ip-address-disclosure.json
- - rw-r--r-- 651 41-response-splitting.json
- - rw-r--r-- 635 42-remote-file-inclusion.json
- - rw-r--r-- 677 43-session-fixation.json
- - rw-r--r-- 427 44-source-code-disclosure.json
- - rw-r--r-- 1,051 45-sql-injection.json
- - rw-r--r-- 851 46-blind-sql-injection.json
- - rw-r--r-- 787 47-blind-sql-injection-timing-attack.json
- - rw-r--r-- 387 48-disclosed-us-social-security-number-ssn.json
- - rw-r--r-- 511 49-unencrypted-password-form.json
- - rw-r--r-- 235 5-captcha-protected-form.json
- - rw-r--r-- 596 50-unvalidated-redirect.json
- - rw-r--r-- 580 51-unvalidated-dom-redirect.json
- - rw-r--r-- 521 52-webdav.json
- - rw-r--r-- 612 53-missing-x-frame-options-header.json
- - rw-r--r-- 645 54-xpath-injection.json
- - rw-r--r-- 773 55-cross-site-scripting-xss.json
- - rw-r--r-- 788 56-dom-based-cross-site-scripting-xss.json
- - rw-r--r-- 865 6-code-injection.json
- - rw-r--r-- 586 63-http-trace.json
- - rw-r--r-- 455 64-xml-external-entity.json
- - rw-r--r-- 503 65-arbitrary-file-upload.json
- - rw-r--r-- 503 66-insecure-ssl-version.json
- - rw-r--r-- 508 67-self-signed-ssl-certificate.json
- - rw-r--r-- 564 68-shellshock.json
- - rw-r--r-- 530 69-insecure-frontpage-configuration.json
- - rw-r--r-- 775 70-persistent-xss.json
- - rw-r--r-- 592 71-reflected-file-download.json
- - rw-r--r-- 591 72-cache-control-headers.json
- - rw-r--r-- 543 73-information-leak-stack-trace.json
- - rw-r--r-- 420 74-phishing-vector.json
- - rw-r--r-- 583 75-guessable-credentials.json
- - rw-r--r-- 558 76-x-content-type-options_header_missing.json
- - rw-r--r-- 616 77-http-basic-authentication-credentials.json
- - rw-r--r-- 995 8-code-injection.json
- - rw-r--r-- 537 9-common-directory.json