.gitignore
LICENSE
README.rst
circle.yml
setup.py
vulndb/__init__.py
vulndb/db_vuln.py
vulndb/requirements-dev.txt
vulndb/version.txt
vulndb.egg-info/PKG-INFO
vulndb.egg-info/SOURCES.txt
vulndb.egg-info/dependency_links.txt
vulndb.egg-info/not-zip-safe
vulndb.egg-info/top_level.txt
vulndb/constants/__init__.py
vulndb/constants/cwe.py
vulndb/constants/owasp.py
vulndb/constants/wasc.py
vulndb/db/1-allowed-http-methods.json
vulndb/db/10-common-sensitive-file.json
vulndb/db/11-cookie-set-for-parent-domain.json
vulndb/db/12-credit-card-number-disclosure.json
vulndb/db/123-spec-example.json
vulndb/db/13-cross-site-request-forgery.json
vulndb/db/14-cvs-svn-user-disclosure.json
vulndb/db/15-directory-listing.json
vulndb/db/16-e-mail-address-disclosure.json
vulndb/db/17-file-inclusion.json
vulndb/db/18-form-based-file-upload.json
vulndb/db/19-missing-strict-transport-security-header.json
vulndb/db/2-a-backdoor-file-exists-on-the-server.json
vulndb/db/20-misconfiguration-in-limit-directive-of-htaccess-file.json
vulndb/db/21-html-object.json
vulndb/db/22-httponly-cookie.json
vulndb/db/23-publicly-writable-directory.json
vulndb/db/24-insecure-client-access-policy.json
vulndb/db/25-insecure-cookie.json
vulndb/db/26-missing-access-control-allow-origin-header.json
vulndb/db/27-insecure-cross-domain-policy-allow-access-from.json
vulndb/db/28-insecure-cross-domain-policy-allow-http-request-headers-from.json
vulndb/db/29-interesting-response.json
vulndb/db/3-backup-directory.json
vulndb/db/30-ldap-injection.json
vulndb/db/31-exposed-localstart-asp-page.json
vulndb/db/32-mixed-resource.json
vulndb/db/33-nosql-injection.json
vulndb/db/34-blind-nosql-injection-differential-analysis.json
vulndb/db/35-access-restriction-bypass-via-origin-spoof.json
vulndb/db/36-operating-system-command-injection.json
vulndb/db/37-operating-system-command-injection-timing-attack.json
vulndb/db/38-password-field-with-auto-complete.json
vulndb/db/39-path-traversal.json
vulndb/db/4-backup-file.json
vulndb/db/40-private-ip-address-disclosure.json
vulndb/db/41-response-splitting.json
vulndb/db/42-remote-file-inclusion.json
vulndb/db/43-session-fixation.json
vulndb/db/44-source-code-disclosure.json
vulndb/db/45-sql-injection.json
vulndb/db/46-blind-sql-injection-differential-analysis.json
vulndb/db/47-blind-sql-injection-timing-attack.json
vulndb/db/48-disclosed-us-social-security-number-ssn.json
vulndb/db/49-unencrypted-password-form.json
vulndb/db/5-captcha-protected-form.json
vulndb/db/50-unvalidated-redirect.json
vulndb/db/51-unvalidated-dom-redirect.json
vulndb/db/52-webdav.json
vulndb/db/53-missing-x-frame-options-header.json
vulndb/db/54-xpath-injection.json
vulndb/db/55-cross-site-scripting-xss.json
vulndb/db/56-dom-based-cross-site-scripting-xss.json
vulndb/db/57-dom-based-cross-site-scripting-xss-via-input-fields.json
vulndb/db/58-dom-based-cross-site-scripting-xss-in-script-context.json
vulndb/db/59-cross-site-scripting-xss-in-event-tag-of-html-element.json
vulndb/db/6-code-injection.json
vulndb/db/60-cross-site-scripting-xss-in-path.json
vulndb/db/61-cross-site-scripting-xss-in-script-context.json
vulndb/db/62-cross-site-scripting-xss-in-html-tag.json
vulndb/db/63-http-trace.json
vulndb/db/64-xml-external-entity.json
vulndb/db/7-code-injection-php-input-wrapper.json
vulndb/db/8-code-injection-timing-attack.json
vulndb/db/9-common-directory.json
vulndb/tests/__init__.py
vulndb/tests/test_db_vuln.py
vulndb/tests/test_load_all_json.py
vulndb/tests/test_proper_data_installation.py
vulndb/tests/db/123-spec-example.json
vulndb/tests/db/124-spec-multiline.json
vulndb/tests/db/125-spec-multiline-newline.json