Skip to content

Commit

Permalink
Merge pull request #3593 from zapbot/crowdin-update
Browse files Browse the repository at this point in the history
Update localized resources
  • Loading branch information
psiinon authored Feb 17, 2022
2 parents 583f89e + fd739c8 commit 7569db3
Show file tree
Hide file tree
Showing 73 changed files with 608 additions and 16 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -50,11 +50,11 @@ accessControl.contextTree.root = Contexto de regla de acceso
accessControl.contextTree.hanging = Reglas antiguas

accessControl.alert.authorization.name = Problemas de Control de Acceso - Autorizaci\u00f3n Inadecuada
accessControl.alert.authorization.otherinfo = Accessed as user\: {0}\n\nRequest detected as authorized\: {1}. The defined access rule for resource is that access should be\: {2}.
accessControl.alert.authorization.otherinfo = Se accede como usuario\: {0}\n\nSolicitud detectada como autorizada\: {1}. La regla de acceso definida para el recurso es que el acceso debe ser\: {2}.
accessControl.alert.authentication.name = Problemas de Control de Acceso - Autenticaci\u00f3n inadecuada
accessControl.alert.authentication.otherinfo = Accessed as an unauthenticated user.\n\nRequest detected as authorized\: {0}. The defined access rule for resource is that access should be\: {1}.
accessControl.alert.authentication.otherinfo = Se accede como usuario no autentificado.\n\nSolicitud detectada como autorizada\: {0}. La regla de acceso definida para el recurso es que el acceso debe ser\: {1}.

accessControl.api.action.scan = Starts an Access Control scan with the given \ncontext ID and user ID. (Optional parameters\: user ID for Unauthenticated \nuser, boolean identifying whether or not Alerts are raised, and the Risk level \nfor the Alerts.) [This assumes the Access Control rules were previously established \nvia ZAP gui and the necessary Context exported/imported.]
accessControl.api.action.scan = Inicia un escaneo de control de acceso con el ID de contexto e ID de usuario. (Par\u00e1metros opcionales\: ID de usuario para el usuario no autenticado usuario, booleano que identifica si se lanzan o no Alertas, y el nivel de Riesgo para las Alertas.) [Esto asume que las reglas de Control de Acceso fueron previamente establecidas a trav\u00e9s del GUI de ZAP y el Contexto necesario exportado/importado].
accessControl.api.action.writeHTMLreport = Genera un reporte de Control de Acceso para el ID de contexto dado y lo almacena en el nombre de archivo (ruta de archivo) proporcionado
accessControl.api.view.getScanProgress = Obtiene el progreso (porcentaje entero) del escaneo del Control de Acceso para el ID de contexto dado
accessControl.api.view.getScanStatus = Gets the Access Control scan status (description string) for the given context ID.
accessControl.api.view.getScanStatus = Obtiene el estado del escaneo (cadena de descripci\u00f3n) del Control de Acceso para el ID del contexto dado.
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
accessControl.desc = Add-on yang menambahkan seperangkat alat untuk menguji kontrol akses pada aplikasi web.
accessControl.activeActionPrefix = Access Control\: {0}
accessControl.activeActionPrefix = Kontrol Akses
accessControl.results.table.header.user = Pengguna
accessControl.results.table.header.authorized = Berwenang
accessControl.results.table.header.rule = Aturan Akses
Expand All @@ -26,8 +26,8 @@ accessControl.scanOptions.label.users = Pengguna untuk memindai sebagai (minim
accessControl.scanOptions.label.raiseAlerts = Peringatan Untuk Isu Teridentifikasi\:
accessControl.scanOptions.label.alertsRisk = Level Resiko Peringatan\:
accessControl.scanOptions.button.scan = Aku belum
accessControl.scanOptions.error.mode.safe = Access control testing is not allowed in 'Safe' mode.
accessControl.scanOptions.error.mode.protected = The following context is not allowed in ''Protected'' mode\:\n{0}
accessControl.scanOptions.error.mode.safe = Percobaan akses kontrol tidak di izin kan pada 'Safe' mode
accessControl.scanOptions.error.mode.protected = Target berikut tidak diizinkan dalam mode ''Protected''\: {0}
accessControl.scanOptions.error.noContext = Kamu harus memilih mulai konteks untuk scan.
accessControl.scanOptions.error.noUsers = Kamu harus memilih setidaknya satu pengguna dalam rangka untuk memulai scan.
accessControl.scanOptions.unauthenticatedUser = << tidak terotentikasi >>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Original file line number Diff line number Diff line change
Expand Up @@ -58,5 +58,15 @@ <h2>Log4Shell (CVE-2021-44228 and CVE-2021-45046)</h2>

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/Log4ShellScanRule.java">Log4ShellScanRule.java</a>

<h2>Out of Band XSS</h2>
This rule attempts to discover Out-of-band XSS vulnerabilities.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/OutOfBandXssScanRule.java">OutOfBandXssScanRule.java</a>

<h2>Exponential Entity Expansion (Billion Laughs Attack)</h2>
This rule attempts to identify the "Billion Laughs" vulnerability in servers that accept XML or YAML files.

Latest code: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/ascanrulesAlpha/src/main/java/org/zaproxy/zap/extension/ascanrulesAlpha/ExponentialEntityExpansionScanRule.java">ExponentialEntityExpansionScanRule.java</a>

</body>
</html>
Loading

0 comments on commit 7569db3

Please sign in to comment.