Skip to content

Conversation

@Umoxfo
Copy link
Contributor

@Umoxfo Umoxfo commented Oct 8, 2025

Overview

Updated the revisit.html help file to enhance readability and consistency. Changes include improved paragraph structure, clearer explanations, fixed typos, and better formatting for API endpoint documentation.

@Umoxfo Umoxfo changed the title revisit: Improve formatting and clarity in revisit help HTML revisit (doc): Improve formatting and clarity in revisit help HTML Oct 8, 2025
@psiinon
Copy link
Member

psiinon commented Oct 8, 2025

Logo
Checkmarx One – Scan Summary & Details9a447e17-be42-4e98-beb5-7b0174b9ba48

New Issues (12)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-53990 Maven-org.asynchttpclient:async-http-client-2.12.3
detailsRecommended version: 2.12.4
Description: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making a...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: ZdHvvv7QrbkMe18%2BxjXuLaNSbudJnUmWSCRUOgEDQgk%3D
Vulnerable Package
HIGH CVE-2017-9096 Maven-com.lowagie:itext-2.1.7
detailsDescription: The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML ext...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: yQZcqsUvkQw5LLTlIaLZ4JqxuTiDdsClwMS78D%2Fx2zA%3D
Vulnerable Package
HIGH CVE-2020-36518 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: jackson-databind before 2.12.6.1 and 2.13.x before 2.13.2.1 allows a Java StackOverflow exception and denial of service via a large depth of neste...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: K1kWNhLGHOtwdGlso74dr7j3AR3xeE4W2BHYK2pTjE4%3D
Vulnerable Package
HIGH CVE-2022-4065 Maven-org.testng:testng-7.5
detailsRecommended version: 7.5.1
Description: A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function "testngXmlExistsInJar"...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: nYQETxqrhBMNDS9qHpU1uND5ov1T3DPzJeeXr%2BTO%2BsY%3D
Vulnerable Package
HIGH CVE-2022-42003 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avo...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: vRhO914dacmw3BcLkFr6eiHMNG%2Fnk5JTWzGn0RSZUkA%3D
Vulnerable Package
HIGH CVE-2022-42004 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in "BeanDeserializer._deserializeFromArray"...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: Ml7JhGrj085VFL5VCPiOE9l1IIRWJIzZW0q5%2FE94hhE%3D
Vulnerable Package
HIGH CVE-2024-7254 Maven-com.google.protobuf:protobuf-java-3.25.1
detailsRecommended version: 3.25.5
Description: Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups/series of SGROUP tags can corrupted by exce...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected] - ... - [email protected]

ID: q%2FWfuKDWTVr0SHnT%2FT7BPU%2FkVaZ7dN%2B6hefipdSYU2E%3D
Vulnerable Package
HIGH CVE-2025-52999 Maven-com.fasterxml.jackson.core:jackson-core-2.13.1
detailsRecommended version: 2.15.0
Description: The jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions pr...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: skipChildren@.../har/HarImporterType.java - ... - [email protected]/ReaderBasedJsonParser.java

ID: p4YQXAYm4WzhysKuROnkiYy%2BndkDYagmd1tGtz6foYg%3D
Vulnerable Package
MEDIUM CVE-2018-10237 Maven-com.google.guava:guava-19.0
detailsRecommended version: 32.0.0.jre-redhat-00001
Description: Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against se...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: tEHk1Lpxca%2Bkv1WxdB5St6qnOPIWd7F8rWw5lz%2FONfQ%3D
Vulnerable Package
MEDIUM CVE-2022-24823 Maven-io.netty:netty-common-4.1.73.Final
detailsRecommended version: 4.1.108.Final-redhat-00002
Description: Netty is an open-source, asynchronous event-driven network application framework. The packages `io.netty:netty-all` and `io.netty:netty-common` 4.1...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: DJcnxVH%2FZfircVoTCrYrGVM%2Fc%2FTo47x%2F39yXPIFkzSw%3D
Vulnerable Package
MEDIUM CVE-2023-34462 Maven-io.netty:netty-handler-4.1.73.Final
detailsRecommended version: 4.1.118.Final
Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clien...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Al%2BEuEYN%2FIpOSkRv2y%2Fzy%2FxuMh3Smbk1z8jcuC8hOOE%3D
Vulnerable Package
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 64
detailsThe application uses the hard-coded password PASSWORD for authentication purposes, either using it to verify users' identities, or to access anoth...
ID: atCyvEBdIHIXTFZfXUh2F6WGL5g%3D
Attack Vector
Fixed Issues (2)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 65
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 68

Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

@thc202 thc202 changed the title revisit (doc): Improve formatting and clarity in revisit help HTML revisit: Improve formatting and clarity in revisit help HTML Oct 8, 2025
@Umoxfo Umoxfo requested a review from kingthorin October 10, 2025 21:16
Copy link
Member

@kingthorin kingthorin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will need squash at merge.

Updated the `revisit.html` help file to enhance readability and consistency. Changes include improved paragraph structure, clearer explanations, fixed typos, and better formatting for API endpoint documentation.

Signed-off-by: Umoxfo <[email protected]>
@thc202 thc202 merged commit 117a080 into zaproxy:main Oct 16, 2025
10 checks passed
@thc202
Copy link
Member

thc202 commented Oct 16, 2025

Thank you!

@github-actions github-actions bot locked and limited conversation to collaborators Oct 16, 2025
@zaproxy zaproxy unlocked this conversation Oct 20, 2025
revisit / action / revisitSiteOff Turns revisit off for the specified site
<p>The add on supports the following API endpoints:</p>

<pre>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Umoxfo it does not seem that pre improved this in Crowdin, maybe better to use unordered list?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, the unordered list is the best option.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

4 participants