Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update localized resources #5547

Merged
merged 1 commit into from
Jul 1, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,28 @@ <h2 id="id-10063">Permissions Policy Header Not Set</h2>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PermissionsPolicyScanRule.java">PermissionsPolicyScanRule.java</a><br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10063/">10063</a>

<h2 id="id-10115">Script Served From Malicious Domain (polyfill)</h2>
This checks for scripts being served from one of the 'polyfill' domains, which are known to have been compromised.<br>
It will raise an alert with a High confidence if a script is loaded from one of the malicious domains,
and a Low confidence if it just finds an apparent reference to one of the malicious domains in the script contents.
<p>
The known malicious 'polyfill' domains are:
<ul>
<li>polyfill.io</li>
<li>bootcdn.net</li>
<li>bootcss.com</li>
<li>staticfile.net</li>
<li>staticfile.org</li>
<li>unionadjs.com</li>
<li>xhsbpza.com</li>
<li>union.macoms.la</li>
<li>newcrbpc.com</li>
</ul>
<p>
Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/pscanrulesBeta/src/main/java/org/zaproxy/zap/extension/pscanrulesBeta/PolyfillCdnScriptScanRule.java">PolyfillCdnScriptScanRule.java</a>
<br>
Alert ID: <a href="https://www.zaproxy.org/docs/alerts/10115/">10115</a>.

<h2 id="id-90004">Site Isolation Scan Rule</h2>
Spectre is a side-channel attack allowing an attacker to read data
from memory. One of the counter-measures is to prevent sensitive data
Expand Down
Loading
Loading