Skip to content

New issue

rangeldarosa edited this page Sep 16, 2021 · 2 revisions

Vulnerability template:

Loads vulnerability templates from Flow. After the first use of the extension, there are two scenarios that can occur.

  1. Load the locally stored templates;
  2. Update the local templates requesting them again from the API.

Probability

The probability of that vulnerability happening.

Impact

The impact that the vulnerability can cause if explored successfully.

This camp supports MarkDownText. Click here for more information about MarkDown.

Compromised environment

If the environment was compromised or not.

This camp supports MarkDownText. Click here for more information about MarkDown.

Description

The description of the vulnerability identified

This camp supports MarkDownText. Click here for more information about MarkDown.

Evidence

The evidence of the vulnerability.

Method

Usually GET, POST, PUT, DELETE, etc.

Protocol

Usually HTTP, HTTPS, FTP, etc.

URI

Uniform Resource Identifier, that is, the corresponding location of the vulnerability, e.g. https://convisoappsec.com/vulnerable.html.

Parameters

The parameters that are in the request. Buttons:

  1. Remove: remove one or more selected parameter(s).
  2. Remove all: removes all parameters.
  3. Redact Value: redacts the value of one selected parameter - multi selected in roadmap).
  4. Import from request: imports the parameters from the request field.

Request

The request made or used.

Response

The response from the server.