mirror of
https://github.com/cve-search/git-vuln-finder.git
synced 2024-11-22 23:07:20 +00:00
2d1cbc220f
* Create a file in patterns/en/medium/ where there is one pattern per line * If needed append .suffix and .prefix to prepend or append those chars to the regex (exactly those chars, don't add a newline char in the end!) * Replicate the actual behavior, for now, only medium is being used, but later, we will add more severities and add them into the output information
30 lines
No EOL
351 B
Text
30 lines
No EOL
351 B
Text
denial of service
|
||
\bXXE\b
|
||
remote code execution
|
||
\bopen redirect
|
||
OSVDB
|
||
\bvuln
|
||
\bCVE\b
|
||
\bXSS\b
|
||
\bReDoS\b
|
||
\bNVD\b
|
||
malicious
|
||
x−frame−options
|
||
attack
|
||
cross site
|
||
exploit
|
||
malicious
|
||
directory traversal
|
||
\bRCE\b
|
||
\bdos\b
|
||
\bXSRF \b
|
||
\bXSS\b
|
||
clickjack
|
||
session.fixation
|
||
hijack
|
||
\badvisory
|
||
\binsecure
|
||
security
|
||
\bcross−origin\b
|
||
unauthori[z|s]ed
|
||
infinite loop |