🗂️ Vulnerabilities Page Documentation

This directory contains the source files for Vulnissimo’s vulnerability database pages. Each vulnerability is documented in its own MDX file, allowing for rich formatting and interactive components.


📁 File Structure


📝 How to Add a New Vulnerability Page

  1. Create a new MDX file in this directory, named after the vulnerability (e.g., example-vulnerability.mdx).
  2. Use the following template for your content:
import Layout from "@/layouts/Vulnerability.astro";
import SectionCard from "@/components/vulnerabilities/SectionCard.astro";

<Layout
  title="Vulnerability Title | Vulnissimo"
  severity={{
    value: "medium", // risk level: low, medium, high, critical
    score: 65,       // numeric score out of 100
    attention: "immediate attention" // short action phrase
  }}
  detectedBy="passive" // or "active"
  references={[{ title: "Reference Title", url: "https://example.com" }]}
>
  <SectionCard>
    ## What is ...?
    Description of the vulnerability
  </SectionCard>

  <SectionCard>
    ## Why is ... a security risk?
    Explain the risk and impact
  </SectionCard>

  <SectionCard>
    ## How to fix ...
    Remediation steps and best practices
  </SectionCard>

  <SectionCard>
    ## How to detect ...
    Detection methods, code snippets, or tools
    ```python
    # Example Python code for detection
    ```
    Add a note about responsible usage
  </SectionCard>
</Layout>
  1. Format your content using Markdown and MDX features. Use <SectionCard> for logical sections. You can include code blocks, lists, and links.
  2. Set the metadata in the <Layout> component for severity, detection mode, and references.
  3. Preview your page locally to ensure correct formatting and rendering. Use npm run dev to start the local server and navigate to the new page. Navigate to http://localhost:4321/vulnerabilities/example-vulnerability to see your changes.