It is valuable
I concur (# line of code, file names and CVE submission).

I would also suggest to use common classifications (or a mapping) such
as OWASP TOP10, WASC, CWE (CAPEC) for your criterias.

Providing details regarding the methodology or/and tools used for the
assessment would be also valuable.
(i.e. Checklist, RIPS,
https://labs.portcullis.co.uk/tools/wordpress-build-review-tool/ )

Thank you
Best regards

2014-02-19 Seth Arnold <seth.arn...@canonical.com>:
> On Wed, Feb 19, 2014 at 06:40:51PM +0000, Harry Metcalfe wrote:
>> We write and publish light-touch inspections of WordPress plugins
>> that we do for our clients. They are just a guide - we conduct some
>> basic checks, not a thorough review.
>>
>> Would plugins which fail this inspection be of general interest to
>> the list and therefore worth posting, as we would a vulnerability?
>>
>> Here's an example report:
>>
>>   https://security.dxw.com/plugins/gd-star-rating-1-9-22/
>>
>> Grateful for a steer...
>
> That's a very nice summary view, but it'd be more useful in this medium
> if you included the lines of code that introduce the vulnerabilities.
>
> Most useful would be to coordinate with authors and MITRE for CVE numbers
> for the issues you find to ensure the issues aren't forgotten about or
> otherwise ignored.
>
> Thanks
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to