-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Loads vulnerability templates from Flow. After the first use of the extension, there are two scenarios that can occur.
- Load the locally stored templates;
- Update the local templates requesting them again from the API.
The probability of that vulnerability happening.
The impact that the vulnerability can cause if explored successfully.
This camp supports MarkDownText. Click here for more information about MarkDown.
If the environment was compromised or not.
This camp supports MarkDownText. Click here for more information about MarkDown.
The description of the vulnerability identified
This camp supports MarkDownText. Click here for more information about MarkDown.
The evidence of the vulnerability.
Usually GET, POST, PUT, DELETE, etc.
Usually HTTP, HTTPS, FTP, etc.
Uniform Resource Identifier, that is, the corresponding location of the vulnerability, e.g. https://convisoappsec.com/vulnerable.html.
The parameters that are in the request. Buttons:
- Remove: remove one or more selected parameter(s).
- Remove all: removes all parameters.
- Redact Value: redacts the value of one selected parameter - multi selected in roadmap).
- Import from request: imports the parameters from the request field.
The request made or used.
The response from the server.