Skip to content

Commit

Permalink
Replaced Navigate to {{url}} with Navigate to the following URL: {{url}}
Browse files Browse the repository at this point in the history
  • Loading branch information
RRudder committed Nov 24, 2023
1 parent 0587f58 commit c573b05
Show file tree
Hide file tree
Showing 9 changed files with 9 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage for the business due to a los

1. Utilize some software that allows computer memory to be accessed in a human-readable format
1. Log in to the application
1. Navigate to {{url}} and perform {{action}}
1. Navigate to the following URL: {{url}} and perform {{action}}
1. Cease using the application
1. Using the computer memory viewer, view the password of the user that remained in memory after use

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t

1. Login to the application and input data so that it is stored by the application
1. Navigate to where the application stores the gathered information
1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Observe the application data that is stored unencrypted

## Proof of Concept (PoC)
Expand Down
2 changes: 1 addition & 1 deletion submissions/description/insecure_data_storage/template.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t

1. Login to the application and input data so that it is stored by the application
1. Navigate to where the application stores the gathered information
1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Observe the application data that is stored unencrypted

## Proof of Concept (PoC)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This vulnerability can lead to reputational damage as customers may view the app
## Steps to Reproduce

1. Install the application on your mobile device
1. Navigate to {{url}} and copy some sensitive account information
1. Navigate to the following URL: {{url}} and copy some sensitive account information
1. Paste this data in some other area of your mobile device and observe that access to the clipboard was enabled in the application

## Proof of Concept (PoC)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This vulnerability can lead to reputational damage as customers may view the app
## Steps to Reproduce

1. View the source code files of the application
1. Navigate to {{url}} and view the sensitive UI functionality does not have the attribute `"filterTouchesWhenObscured="true"`, thus allowing tapjacking attacks on certain Android OS versions
1. Navigate to the following URL: {{url}} and view the sensitive UI functionality does not have the attribute `"filterTouchesWhenObscured="true"`, thus allowing tapjacking attacks on certain Android OS versions

## Proof of Concept (PoC)

Expand Down

0 comments on commit c573b05

Please sign in to comment.