vrt 0.3.2 → 0.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/data/1.3.1/deprecated-node-mapping.json +77 -0
- data/lib/data/1.3.1/mappings/cvss_v3.json +722 -0
- data/lib/data/1.3.1/mappings/cvss_v3.schema.json +59 -0
- data/lib/data/1.3.1/vrt.schema.json +63 -0
- data/lib/data/1.3.1/vulnerability-rating-taxonomy.json +1607 -0
- data/lib/vrt/version.rb +1 -1
- metadata +7 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 496777a44576c8dbffd594bd593ef3e9b156bfb4
|
4
|
+
data.tar.gz: 846f99f14fd5ecf2014f977f99eef71df9ca9575
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 656092004ad47bd26e59fd7f610860745c49e834c7998b5e26e5ecdf39f77c58dcf3c800e516afc94f7214c64857b9b6ae5d17d3702302e2f88ff6671d0b88f2
|
7
|
+
data.tar.gz: 3f11baed9a0935f76cdb5002dbf7ee90def6dde5257083892ff22031c5508ea98140b5f518887e64b6f420e463a77afc5f7f698c49f959dd257eead3c7ea3cf5
|
@@ -0,0 +1,77 @@
|
|
1
|
+
{
|
2
|
+
"poor_physical_security": {
|
3
|
+
"1.1": "other"
|
4
|
+
},
|
5
|
+
"social_engineering": {
|
6
|
+
"1.1": "other"
|
7
|
+
},
|
8
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_all_users": {
|
9
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
10
|
+
},
|
11
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_authenticated": {
|
12
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
13
|
+
},
|
14
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_unauthenticated": {
|
15
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
16
|
+
},
|
17
|
+
"broken_authentication_and_session_management.session_token_in_url.over_https": {
|
18
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
19
|
+
},
|
20
|
+
"broken_authentication_and_session_management.session_token_in_url.over_http": {
|
21
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
22
|
+
},
|
23
|
+
"broken_authentication_and_session_management.session_token_in_url": {
|
24
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
25
|
+
},
|
26
|
+
"insecure_data_transport": {
|
27
|
+
"1.2": "mobile_security_misconfiguration"
|
28
|
+
},
|
29
|
+
"insecure_data_transport.ssl_certificate_pinning": {
|
30
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning"
|
31
|
+
},
|
32
|
+
"insecure_data_transport.ssl_certificate_pinning.absent": {
|
33
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning.absent"
|
34
|
+
},
|
35
|
+
"insecure_data_transport.ssl_certificate_pinning.defeatable": {
|
36
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning.defeatable"
|
37
|
+
},
|
38
|
+
"insecure_data_storage.credentials_stored_unencrypted": {
|
39
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted"
|
40
|
+
},
|
41
|
+
"insecure_data_storage.credentials_stored_unencrypted.on_external_storage": {
|
42
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted.on_external_storage"
|
43
|
+
},
|
44
|
+
"insecure_data_storage.credentials_stored_unencrypted.on_internal_storage": {
|
45
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted.on_internal_storage"
|
46
|
+
},
|
47
|
+
"insufficient_security_configurability.weak_password_policy.complexity_both_length_and_char_type_not_enforced": {
|
48
|
+
"1.2": "insufficient_security_configurability.no_password_policy"
|
49
|
+
},
|
50
|
+
"missing_function_level_access_control": {
|
51
|
+
"1.3": "broken_access_control"
|
52
|
+
},
|
53
|
+
"missing_function_level_access_control.server_side_request_forgery_ssrf": {
|
54
|
+
"1.3": "broken_access_control.server_side_request_forgery_ssrf"
|
55
|
+
},
|
56
|
+
"missing_function_level_access_control.server_side_request_forgery_ssrf.internal": {
|
57
|
+
"1.3": "broken_access_control.server_side_request_forgery_ssrf.internal"
|
58
|
+
},
|
59
|
+
"missing_function_level_access_control.server_side_request_forgery_ssrf.external": {
|
60
|
+
"1.3": "broken_access_control.server_side_request_forgery_ssrf.external"
|
61
|
+
},
|
62
|
+
"missing_function_level_access_control.username_enumeration": {
|
63
|
+
"1.3": "broken_access_control.username_enumeration"
|
64
|
+
},
|
65
|
+
"missing_function_level_access_control.username_enumeration.data_leak": {
|
66
|
+
"1.3": "broken_access_control.username_enumeration.data_leak"
|
67
|
+
},
|
68
|
+
"missing_function_level_access_control.exposed_sensitive_android_intent": {
|
69
|
+
"1.3": "broken_access_control.exposed_sensitive_android_intent"
|
70
|
+
},
|
71
|
+
"missing_function_level_access_control.exposed_sensitive_ios_url_scheme": {
|
72
|
+
"1.3": "broken_access_control.exposed_sensitive_ios_url_scheme"
|
73
|
+
},
|
74
|
+
"insecure_direct_object_references_idor": {
|
75
|
+
"1.3": "broken_access_control.idor"
|
76
|
+
}
|
77
|
+
}
|