Changes
- Upgrade browserker to version
0.0.110
(!656)- Handle error when Browserker fails to start browserker!886
- Upgrade vulnerability checks to version
1.0.51
browserker!877- Update severity in active checks
74.1
,94.4
to allow for parsing dast-cwe-checks!192 - Remove trailing new line in attack
78.1
payload dast-cwe-checks!191 - Remove trailing new line in attack
94.1
payload dast-cwe-checks!190 - Standardize encoding used in YAML definitions dast-cwe-checks!193
- Extend
passive_location_matcher
withbinary
andbyte_limit
properties dast-cwe-checks!194
- Update severity in active checks
- Upgrade vulnerability checks to version
1.0.52
browserker!877- Use standardized encoding for payloads in YAML definitions dast-cwe-checks!197
- Don't trim payloads so that active checks can include new lines in an attack browserker!877
- Upgrade browserker to version
0.0.109
(!656)- Add request path injection location browserker!829
- Add support for binary matching in response bodies browserker!873
- Upgrade browserker to version
0.0.108
(!653)- Add support for multipart form data injection location browserker!819
- Enable active check
94.3
Server-side code injection (Python) browserker!863 - Enable active check
94.2
Server-side code injection (Ruby) browserker!867 - Upgrade minimum supported version of Go to version
1.18
browserker!865 - Upgrade Chromium to version
105.0.5195.102-1
browserker!872 - Upgrade Chromium DevTools protocol to version
105.0.5195.102-1
browserker!872
- Enable browser-based active check
94.2
Server-side code injection (Ruby) (!653) - Enable browser-based active check
94.3
Server-side code injection (Python) (!653) - Update ChromeDriver to version
105.0.5195.52
to support Chromium 105 (!465)