.gitignore
LICENSE
README.rst
circle.yml
setup.py
tools/semver.sh
tools/update-db.sh
vulndb/__init__.py
vulndb/db-version.txt
vulndb/db_vuln.py
vulndb/requirements-dev.txt
vulndb/version.txt
vulndb.egg-info/PKG-INFO
vulndb.egg-info/SOURCES.txt
vulndb.egg-info/dependency_links.txt
vulndb.egg-info/not-zip-safe
vulndb.egg-info/top_level.txt
vulndb/constants/__init__.py
vulndb/constants/cwe.py
vulndb/constants/owasp.py
vulndb/constants/wasc.py
vulndb/db/1-allowed-http-methods.json
vulndb/db/10-common-sensitive-file.json
vulndb/db/11-cookie-set-for-parent-domain.json
vulndb/db/12-credit-card-number-disclosure.json
vulndb/db/13-cross-site-request-forgery.json
vulndb/db/14-cvs-svn-user-disclosure.json
vulndb/db/15-directory-listing.json
vulndb/db/16-e-mail-address-disclosure.json
vulndb/db/17-file-inclusion.json
vulndb/db/18-form-based-file-upload.json
vulndb/db/19-missing-strict-transport-security-header.json
vulndb/db/2-a-backdoor-file-exists-on-the-server.json
vulndb/db/20-misconfiguration-in-limit-directive-of-htaccess-file.json
vulndb/db/21-html-object.json
vulndb/db/22-httponly-cookie.json
vulndb/db/23-publicly-writable-directory.json
vulndb/db/24-insecure-client-access-policy.json
vulndb/db/25-insecure-cookie.json
vulndb/db/26-access-control-allow-origin-star.json
vulndb/db/27-insecure-cross-domain-policy-allow-access-from.json
vulndb/db/29-interesting-response.json
vulndb/db/3-backup-directory.json
vulndb/db/30-ldap-injection.json
vulndb/db/31-exposed-localstart-asp-page.json
vulndb/db/32-mixed-resource.json
vulndb/db/33-nosql-injection.json
vulndb/db/34-blind-nosql-injection-differential-analysis.json
vulndb/db/35-access-restriction-bypass-via-origin-spoof.json
vulndb/db/36-operating-system-command-injection.json
vulndb/db/38-password-field-with-auto-complete.json
vulndb/db/39-path-traversal.json
vulndb/db/4-backup-file.json
vulndb/db/40-private-ip-address-disclosure.json
vulndb/db/41-response-splitting.json
vulndb/db/42-remote-file-inclusion.json
vulndb/db/43-session-fixation.json
vulndb/db/44-source-code-disclosure.json
vulndb/db/45-sql-injection.json
vulndb/db/46-blind-sql-injection.json
vulndb/db/47-blind-sql-injection-timing-attack.json
vulndb/db/48-disclosed-us-social-security-number-ssn.json
vulndb/db/49-unencrypted-password-form.json
vulndb/db/5-captcha-protected-form.json
vulndb/db/50-unvalidated-redirect.json
vulndb/db/51-unvalidated-dom-redirect.json
vulndb/db/52-webdav.json
vulndb/db/53-missing-x-frame-options-header.json
vulndb/db/54-xpath-injection.json
vulndb/db/55-cross-site-scripting-xss.json
vulndb/db/56-dom-based-cross-site-scripting-xss.json
vulndb/db/6-code-injection.json
vulndb/db/63-http-trace.json
vulndb/db/64-xml-external-entity.json
vulndb/db/65-arbitrary-file-upload.json
vulndb/db/66-insecure-ssl-version.json
vulndb/db/67-self-signed-ssl-certificate.json
vulndb/db/68-shellshock.json
vulndb/db/69-insecure-frontpage-configuration.json
vulndb/db/70-persistent-xss.json
vulndb/db/71-reflected-file-download.json
vulndb/db/72-cache-control-headers.json
vulndb/db/73-information-leak-stack-trace.json
vulndb/db/74-phishing-vector.json
vulndb/db/75-guessable-credentials.json
vulndb/db/76-x-content-type-options_header_missing.json
vulndb/db/77-HTTP-Basic-Authenticationcredentials.json
vulndb/db/8-code-injection.json
vulndb/db/9-common-directory.json
vulndb/tests/__init__.py
vulndb/tests/test_db_vuln.py
vulndb/tests/test_latest_vulndb_data.py
vulndb/tests/test_load_all_json.py
vulndb/tests/test_proper_data_installation.py
vulndb/tests/db/123-spec-example.json
vulndb/tests/db/124-spec-multiline.json
vulndb/tests/db/125-spec-multiline-newline.json