Skip to content

Commit c7a2d4f

Browse files
authored
Merge pull request #1751 from zapbot/update-site-content
Update site content
2 parents 0cb64a6 + 80bc150 commit c7a2d4f

File tree

23 files changed

+62
-62
lines changed

23 files changed

+62
-62
lines changed

alerttags/cwe-601/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ <h4><a href="https://cwe.mitre.org/data/definitions/601.html">https://cwe.mitre.
170170

171171

172172
<tr>
173-
<td><a href="/docs/alerts/10028/">Open Redirect</a></td>
173+
<td><a href="/docs/alerts/10028/">Off-site Redirect</a></td>
174174
<td><a href=""></a></td>
175175
</tr>
176176

alerttags/cwe-601/index.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@
3636
<description>&lt;p&gt;URL redirectors represent common functionality employed by web sites to forward an incoming request to an alternate resource. This can be done for a variety of reasons and is often done to allow resources to be moved within the directory structure and to avoid breaking functionality for users that request the resource at its previous location. URL redirectors may also be used to implement load balancing, leveraging abbreviated URLs or recording outgoing links. It is this last implementation which is often used in phishing attacks as described in the example below. URL redirectors do not necessarily represent a direct security vulnerability but can be abused by attackers trying to social engineer victims into believing that they are navigating to a site other than the true destination.&lt;/p&gt;</description>
3737
</item>
3838
<item>
39-
<title>Open Redirect</title>
39+
<title>Off-site Redirect</title>
4040
<link>/docs/alerts/10028/</link>
4141
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
4242
<guid>/docs/alerts/10028/</guid>
43-
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an offsite redirect. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
43+
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an off-site destination. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
4444
</item>
4545
</channel>
4646
</rss>

alerttags/owasp_2017_a01/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ <h4><a href="https://owasp.org/www-project-top-ten/2017/A1_2017-Injection.html">
242242

243243

244244
<tr>
245-
<td><a href="/docs/alerts/10028/">Open Redirect</a></td>
245+
<td><a href="/docs/alerts/10028/">Off-site Redirect</a></td>
246246
<td><a href=""></a></td>
247247
</tr>
248248

alerttags/owasp_2017_a01/index.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,11 +120,11 @@
120120
<description>&lt;p&gt;MongoDB query injection may be possible.&lt;/p&gt;</description>
121121
</item>
122122
<item>
123-
<title>Open Redirect</title>
123+
<title>Off-site Redirect</title>
124124
<link>/docs/alerts/10028/</link>
125125
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
126126
<guid>/docs/alerts/10028/</guid>
127-
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an offsite redirect. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
127+
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an off-site destination. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
128128
</item>
129129
<item>
130130
<title>Parameter Tampering</title>

alerttags/owasp_2021_a03/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ <h4><a href="https://owasp.org/Top10/A03_2021-Injection/">https://owasp.org/Top1
272272

273273

274274
<tr>
275-
<td><a href="/docs/alerts/10028/">Open Redirect</a></td>
275+
<td><a href="/docs/alerts/10028/">Off-site Redirect</a></td>
276276
<td><a href=""></a></td>
277277
</tr>
278278

alerttags/owasp_2021_a03/index.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,11 +155,11 @@
155155
<description>&lt;p&gt;MongoDB query injection may be possible.&lt;/p&gt;</description>
156156
</item>
157157
<item>
158-
<title>Open Redirect</title>
158+
<title>Off-site Redirect</title>
159159
<link>/docs/alerts/10028/</link>
160160
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
161161
<guid>/docs/alerts/10028/</guid>
162-
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an offsite redirect. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
162+
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an off-site destination. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
163163
</item>
164164
<item>
165165
<title>Out of Band XSS</title>

alerttags/policy_dev_std/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,7 +350,7 @@ <h4>POLICY_DEV_STD</h4>
350350

351351

352352
<tr>
353-
<td><a href="/docs/alerts/10028/">Open Redirect</a></td>
353+
<td><a href="/docs/alerts/10028/">Off-site Redirect</a></td>
354354
<td><a href=""></a></td>
355355
</tr>
356356

alerttags/policy_dev_std/index.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -246,11 +246,11 @@
246246
<description>&lt;p&gt;The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.&lt;/p&gt;</description>
247247
</item>
248248
<item>
249-
<title>Open Redirect</title>
249+
<title>Off-site Redirect</title>
250250
<link>/docs/alerts/10028/</link>
251251
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
252252
<guid>/docs/alerts/10028/</guid>
253-
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an offsite redirect. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
253+
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an off-site destination. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
254254
</item>
255255
<item>
256256
<title>Path Traversal</title>

alerttags/policy_pentest/index.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -728,13 +728,13 @@ <h4>POLICY_PENTEST</h4>
728728

729729

730730
<tr>
731-
<td><a href="/docs/alerts/10032-3/">Old Asp.Net Version in Use</a></td>
731+
<td><a href="/docs/alerts/10028/">Off-site Redirect</a></td>
732732
<td><a href=""></a></td>
733733
</tr>
734734

735735

736736
<tr>
737-
<td><a href="/docs/alerts/10028/">Open Redirect</a></td>
737+
<td><a href="/docs/alerts/10032-3/">Old Asp.Net Version in Use</a></td>
738738
<td><a href=""></a></td>
739739
</tr>
740740

alerttags/policy_pentest/index.xml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -686,20 +686,20 @@
686686
<guid>/docs/alerts/10038-2/</guid>
687687
<description>&lt;p&gt;The &amp;ldquo;X-Content-Security-Policy&amp;rdquo; and &amp;ldquo;X-WebKit-CSP&amp;rdquo; headers are no longer recommended.&lt;/p&gt;</description>
688688
</item>
689+
<item>
690+
<title>Off-site Redirect</title>
691+
<link>/docs/alerts/10028/</link>
692+
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
693+
<guid>/docs/alerts/10028/</guid>
694+
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an off-site destination. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
695+
</item>
689696
<item>
690697
<title>Old Asp.Net Version in Use</title>
691698
<link>/docs/alerts/10032-3/</link>
692699
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
693700
<guid>/docs/alerts/10032-3/</guid>
694701
<description>&lt;p&gt;This website uses ASP.NET version 1.0 or 1.1.&lt;/p&gt;</description>
695702
</item>
696-
<item>
697-
<title>Open Redirect</title>
698-
<link>/docs/alerts/10028/</link>
699-
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
700-
<guid>/docs/alerts/10028/</guid>
701-
<description>&lt;p&gt;Open redirects are one of the OWASP 2010 Top Ten vulnerabilities. This check looks at user-supplied input in query string parameters and POST data to identify where open redirects might be possible. Open redirects occur when an application allows user-supplied input (e.g. &lt;a href=&#34;https://nottrusted.com&#34;&gt;https://nottrusted.com&lt;/a&gt;) to control an offsite redirect. This is generally a pretty accurate way to find where 301 or 302 redirects could be exploited by spammers or phishing attacks.&lt;/p&gt;</description>
702-
</item>
703703
<item>
704704
<title>Out of Band XSS</title>
705705
<link>/docs/alerts/40031/</link>

0 commit comments

Comments
 (0)