From f18aa020f745412c2c463c7f98b1443d65d66741 Mon Sep 17 00:00:00 2001 From: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> Date: Sun, 1 Sep 2024 10:57:40 +0330 Subject: [PATCH] Update 5.3.3.2.yaml Signed-off-by: AmirHossein Raeisi <96957814+Ahsraeisi@users.noreply.github.com> --- templates/dast/5.3.3.2.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/templates/dast/5.3.3.2.yaml b/templates/dast/5.3.3.2.yaml index 55f1434..a8d0005 100644 --- a/templates/dast/5.3.3.2.yaml +++ b/templates/dast/5.3.3.2.yaml @@ -10,7 +10,6 @@ info: - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting - https://snbig.github.io/Vulnerable-Pages/ASVS_5_3_3/ - https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/vulnerabilities/xss/reflected-xss.yaml - - https://snbig.github.io/Vulnerable-Pages/ASVS_5_3_3/ tags: asvs,5.3.3 description: | Verify that context-aware, preferably automated - or at worst, manual - output escaping protects against reflected, stored, and DOM based XSS. ([C4](https://owasp.org/www-project-proactive-controls/#div-numbering))