-
### Is your feature request related to a problem? Please describe.
your XSS scanner doesn't detect the Vulnerability in HTML attrname or value ,because it doesn't parse the location of the payload , …
-
looks like your domain got pwnd or something because going to the link in the git readme trys to launch malware from my browser.
-
```
What steps will reproduce one of the problems?
A.persistent XSS via urlToScan parameter of scanner.php
screenshot 'persistent XSS_1.jpg' attacked
1. attempt to scan http://test123.com/alert(1)…
-
### Is your feature request related to a problem? Please describe.
A type of persistent XSS checker but tests to see if HTML is valid on all pages at the end of an active scan to test if an injection…
-
```
What steps will reproduce one of the problems?
A.persistent XSS via urlToScan parameter of scanner.php
screenshot 'persistent XSS_1.jpg' attacked
1. attempt to scan http://test123.com/alert(1)…
-
Enhance the scanner to search for well-known javascript contexts like `onclick=""` HTML attributes to increase coverage.
-
**Describe the bug**
I was wondering if the expected issues provided (scanner/sast/expectedIssues.csv) within the repo is current. If not, is there a separate repo or file that contain an updated ver…
-
Hi there!
I tried your web scanner, but I get "A" instead of "A+" because it seems that your scanner is not parsing well the X-XSS-Protection HTTP header.
It seems that it wants "1; mode=block;"…
-
https://github.com/sunfeiSprint/WebSecurity_Final
https://github.com/zxfchris/WebProject
https://github.com/jaeindia/Vulnerability-Scanner
https://github.com/swapnil3667/Web_Scanner
https://github…
-
# 🦸♀️ Famed Scanner
## 📝 Description
Detected directly writing to a Response object from user-defined input. This bypasses any HTML escaping and may expose your application to a Cross-Site-scripti…