-
## What happens?
不确定这个问题到底是否属于umi,我先描述这个问题,希望可以得到解决方法。
我们的产品的在申请 **销售许可证**,在申请的时候需要通过安全审查,用的似乎是 `acunetix` 这个工具。
我们用的是antd pro这个脚手架
截图是检测报告中关于风险的描述
![image](https://user-images.gith…
-
```yaml
id: test-cgi-script-leaking-environment-variables
info:
author: emadshanab
name: "Test CGI script leaking environment variables"
reference: "https://www.acunetix.com/vulnerabilitie…
-
Binary Ninja Version: 3.0.3313-dev Personal, b9014d5e
Platform: Ubuntu 20.04.4 LTS
Hi, first of all i love your product
ghost updated
2 years ago
-
### Template Information:
### Nuclei Template:
```yaml
id: apc-file-leak
info:
name: apc-file-leak
severity: info
author: ffffffff0x
metadata:
google-dork: inu…
-
Acunetix scan reports this app is using jQuery 1.12.4 and should be updated. This is a Medium vulnerability and should be a priority.
-
Acunetix scan reports this app uses GET to submit passwords. Passwords must be submitted using a POST request. This is a Medium vulnerability and is a priority. The specific file reported is:
>http…
-
Acunetix scan reports this app is using jQuery 1.7 and should be updated. This is a Medium vulnerability and should be a priority.
Note that Acunetix reported this for the website hosted at sparrow…
-
Target URLhttp://testphp.vulnweb.com/Target DescriptionSeverityHighAffectshttp://testphp.vulnweb.com/AJAX/infoartist.php
Attack Details
URL encoded GET input id was set to 1193606'"672007
…
-
Target URLhttp://testphp.vulnweb.com/Target DescriptionSeverityHighAffectshttp://testphp.vulnweb.com/search.php
Attack Details
URL encoded GET input test was set to 1549782'"267538
…
-
Acunetix scan reports this app uses GET to submit passwords. Passwords must be submitted using a POST request. This is a Medium vulnerability and is a priority.