File tree Expand file tree Collapse file tree 2 files changed +0
-3
lines changed Expand file tree Collapse file tree 2 files changed +0
-3
lines changed Original file line number Diff line number Diff line change @@ -31,7 +31,6 @@ This project contains the following vulnerabilities:
3131
3232- Remote Code Execution
3333- SQL injection
34- - XSS
3534- Insecure Deserialization
3635- Directory Traversal
3736- Open Redirect
@@ -47,7 +46,6 @@ $ grep vulnerability . -R -n | grep -v README
4746./flask_webgoat/actions.py:43: # vulnerability: Remote Code Execution
4847./flask_webgoat/users.py:37: # vulnerability: SQL Injection
4948./flask_webgoat/auth.py:17: # vulnerability: SQL Injection
50- ./flask_webgoat/ui.py:14: # vulnerability: XSS
5149./flask_webgoat/actions.py:60: # vulnerability: Insecure Deserialization
5250./flask_webgoat/actions.py:35: # vulnerability: Directory Traversal
5351./flask_webgoat/auth.py:45: # vulnerability: Open Redirect
Original file line number Diff line number Diff line change @@ -16,7 +16,6 @@ def search():
1616 try :
1717 query = "SELECT username, access_level FROM user WHERE username LIKE ?;"
1818 results = query_db (query , (query_param ,))
19- # vulnerability: XSS
2019 return render_template (
2120 "search.html" , results = results , num_results = len (results ), query = query_param
2221 )
You can’t perform that action at this time.
0 commit comments