nuclei-templates/vulnerabilities/generic
Prince Chaddha 7ada510859
Fixed possible FPs in open redirect templates (#4544)
* Fixed possible FPs in open redirect templates

We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.

* updated example domain

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
..
basic-xss-prober.yaml Update basic-xss-prober.yaml 2021-08-11 13:07:17 +05:30
cache-poisoning.yaml Fixed possible FPs in open redirect templates (#4544) 2022-06-06 16:10:15 +05:30
cors-misconfig.yaml CORS misconfig improvements (#3988) 2022-04-16 21:06:53 +05:30
crlf-injection.yaml Break CVE-2016-4975 into its own template 2021-09-30 15:35:17 -04:00
error-based-sql-injection.yaml Updated all templates tags with technologies (#3478) 2022-01-05 01:04:16 +05:30
generic-blind-xxe.yaml Updated all templates tags with technologies (#3478) 2022-01-05 01:04:16 +05:30
generic-linux-lfi.yaml Update generic-linux-lfi.yaml 2021-09-20 23:53:49 +05:30
generic-windows-lfi.yaml Added stop-at-first-match in applicable templates 2021-09-02 17:29:10 +05:30
host-header-injection.yaml Create host-header-injection.yaml 2021-09-06 17:14:27 +05:30
oob-header-based-interaction.yaml refactor: Description field uniformization 2022-04-22 13:38:41 +03:00
oob-param-based-interaction.yaml refactor: Description field uniformization 2022-04-22 13:38:41 +03:00
open-redirect.yaml Fixed possible FPs in open redirect templates (#4544) 2022-06-06 16:10:15 +05:30
request-based-interaction.yaml refactor: Description field uniformization 2022-04-22 13:38:41 +03:00
top-xss-params.yaml refactor: Description field uniformization 2022-04-22 13:38:41 +03:00
xmlrpc-pingback-ssrf.yaml refactor: Description field uniformization 2022-04-22 13:38:41 +03:00