常见安全漏洞css,常见web漏洞分类

漏洞分类相关:

A rough list of the security checks offered by the tool is outlined below.

* High risk flaws (potentially leading to system compromise):

* Server-side query injection (including blind vectors, numerical parameters).

* Explicit SQL-like syntax in GET or POST parameters.

* Server-side shell command injection (including blind vectors).

* Server-side XML / XPath injection (including blind vectors).

* Format string vulnerabilities.

* Integer overflow vulnerabilities.

* Locations accepting HTTP PUT.

* Medium risk flaws (potentially leading to data compromise):

* Stored and reflected XSS vectors in document body (minimal JS XSS support).

* Stored and reflected XSS vectors via HTTP redirects.

* Stored and reflected XSS vectors via HTTP header splitting.

* Directory traversal / LFI / RFI (including constrained vectors).

* Assorted file POIs (server-side sources, configs, etc).

* Attacker-supplied script and CSS inclusion vectors (stored and reflected).

* External untrusted script and CSS inclusion vectors.

* Mixed content problems on script and CSS resources (optional).

* Password forms submitting from or to non-SSL pages (optional).

* Incorrect or missing MIME types on renderables.

* Generic MIME types on renderables.

* Incorrect or missing charsets on renderables.

* Conflicting MIME / charset info on renderables.

* Bad caching directives on cookie setting responses.

* Low risk issues (limited impact or low specificity):

* Directory listing bypass vectors.

* Redirection to attacker-supplied URLs (stored and reflected).

* Attacker-supplied embedded content (stored and reflected).

* External untrusted embedded content.

* Mixed content on non-scriptable subresources (optional).

* HTTPS -> HTTP submission of HTML forms (optional).

* HTTP credentials in URLs.

* Expired or not-yet-valid SSL certificates.

* HTML forms with no XSRF protection.

* Self-signed SSL certificates.

* SSL certificate host name mismatches.

* Bad caching directives on less sensitive content.

* Internal warnings:

* Failed resource fetch attempts.

* Exceeded crawl limits.

* Failed 404 behavior checks.

* IPS filtering detected.

* Unexpected response variations.

* Seemingly misclassified crawl nodes.

* Non-specific informational entries:

* General SSL certificate information.

* Significantly changing HTTP cookies.

* Changing Server, Via, or X-... headers.

* New 404 signatures.

* Resources that cannot be accessed.

* Resources requiring HTTP authentication.

* Broken links.

* Server errors.

* All external links not classified otherwise (optional).

* All external e-mails (optional).

* All external URL redirectors (optional).

* Links to unknown protocols.

* Form fields that could not be autocompleted.

* Password entry forms (for external brute-force).

* File upload forms.

* Other HTML forms (not classified otherwise).

* Numerical file names (for external brute-force).

* User-supplied links otherwise rendered on a page.

* Incorrect or missing MIME type on less significant content.

* Generic MIME type on less significant content.

* Incorrect or missing charset on less significant content.

* Conflicting MIME / charset information on less significant content.

* OGNL-like parameter passing conventions.

源文链接:https://github.com/spinkham/skipfish

最后编辑:2019-01-16作者:admin

这个作者貌似有点懒,什么都没有留下。

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值