OWASP-02-05-2024/repeatedVuln.md

54 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2024-05-02 17:18:34 +02:00
### MEDIUM RISK
## 1. CSP: Wildcard Directive
# Eric response: Can't we updated the apache config to add trusted source?
## 2. CSP: style-src 'unsafe-inline'
# Eric response: Accept the risk
## 3. CSP Header Not Set
# Eric response: This is zabbix it's for internal use. Accept the risk
## 4. CSP: script-src 'unsafe-inline'
# Eric response: This is zabbix it's for internal use. Accept the risk
## 5. Absence of Anti-CSRF Tokens
# Eric response: accept the risk
## 6. Source Code Disclosure - SQL
# Eric response: what source code is exposed?
## 7. Sub Resource Integrity Attribute Missing
# Eric response: nothink currently. Can you provide the integrity tag for the concerned external script
## 8. Vulnerable JavaScript Library
# Eric response: What's the concerne library?
## 9. Missing Anti-clickjacking Header
# Eric response:
## 10. Cross-Domain Misconfiguration
# Eric response:
### LOW RISK
## 1. Strict-Transport-Security Header Not Set
# Eric response: accept risk
## 2. Dangerous JavaScript Functions
# Eric response: Accept the risk
## 3. Server Leaks Version Information via 'Server' HTTP Response Header
# Eric response: Accept the risk
## 4. CSP: X-Content-Type-Options Header Missing
# Eric response: Accept risk
## 5. Cross-Domain JavaScript Source File Inclusion
# Eric response: accept the risk
## 6. Cookie Without Secure Flag
# Eric response: accept the risk
## 7. Cookie with SameSite Attribute None
# Eric response: accept the risk