-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove duplicate entries (which differ on technique used to detect vulnerability) #13
Comments
From vulndb's point of view yeah, you can remove one of them. |
@Zapotek well, this started as a comment to myself, but it's really good you've answered since now I can ask a couple of follow-up questions 👍 I believe we'll have a small decision to make here. First let me ask: "Do you intend on using vulndb in Arachni?" If the answer is yes, then we'll have to find a way to handle these cases, one of course can be that arachni reports the same vulnerability (without the different title) in both cases, another is that the ruby-sdk allows you to override the title? The same thing happens with other vulnerabilities like XSS where the json files are almost the same. In cases like this I'm unsure if the developer reading these descriptions benefits from:
vs.
I want you to use vulndb in Arachni, hell, I want every tool to use it, it's the only way to maintain and grow it! So... what should we do? Referenced files
|
I think we should remove all those permutations (same goes for timing attacks etc) and only keep the data for the root issue. And yeah I'd like to use vulndb in Arachni eventually. |
Ok then, I'll keep this issue open so we remember to do it |
…used to detect vulnerability)" #13
Are 27 and 28 the same vulnerability?
The text was updated successfully, but these errors were encountered: