<!--
|
|
This list the alerts
|
|
0 Directory browsing
|
1 Potential File Path Manipulation
|
2 Private IP disclosure
|
3 Session ID in URL rewrite
|
4 Obsolete file (Depreciated)
|
5 Obsolete file extended check (Depreciated)
|
6 Directory/Path traversal
|
7 Remote File Inclusion
|
|
10000 Password Autocomplete in browser (Depreciated)
|
10001 Secure page browser cache
|
|
10010 Cookie set without HttpOnly flag
|
10011 Cookie set without secure flag
|
10012 Password Autocomplete in browser
|
10013 Weak HTTP authentication over an unsecured connection
|
10014 Cross Site Request Forgery
|
10015 Incomplete or no cache-control and pragma HTTPHeader set
|
10016 Web Browser XSS Protection Not Enabled
|
10017 Cross-domain JavaScript source file inclusion
|
10018 Untrusted domains in JavaScript source code
|
10019 Content-Type header missing
|
10020 X-Frame-Options header not set
|
10021 X-Content-Type-Options header missing
|
10022 Information disclosure - database error messages
|
10023 Information disclosure - debug error messages
|
10024 Information disclosure - sensitive informations in URL
|
10025 Information disclosure - sensitive informations on HTTP Referrer header
|
10026 HTTP Parameter Override
|
10027 Information disclosure - suspicious comments
|
10028 Open redirect
|
10029 Cookie poisoning
|
10030 User controllable charset
|
10031 User controllable HTML element attribute (potential XSS)
|
10032 Viewstate scanner
|
10033 Directory Browsing
|
10034 Heartbleed OpenSSL Vulnerability
|
10035 Strict-Transport-Security Header Not Set
|
10036 Server Leaks Version Information via "Server" HTTP Response Header Field
|
10037 Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s)
|
10038 Content Security Policy (CSP) Header Not Set
|
10039 X-Backend-Server Header Information Leak
|
10040 Secure pages including mixed content
|
10041 HTTP to HTTPS insecure transition in form post
|
10042 HTTPS to HTTP insecure transition in form post
|
10043 User controllable javascript event (XSS)
|
|
20000 Cold Fusion default file (Depreciated)
|
20001 Lotus Domino default files (Depreciated)
|
20002 IIS default file (Depreciated)
|
20003 Macromedia JRun default files (Depreciated)
|
20004 Tomcat source file disclosure (Depreciated)
|
20005 BEA WebLogic example files (Depreciated)
|
20006 IBM WebSphere default files (Depreciated)
|
20010 URL Redirector Abuse
|
20014 HTTP Parameter Pollution
|
20015 Heartbleed OpenSSL Vulnerability
|
20016 Cross-Domain Requests Permitted
|
|
30000 External redirect
|
|
40000 Cross site scripting
|
40001 Cross site scripting in SCRIPT section
|
40002 Cross site scripting without brackets
|
40003 CRLF injection
|
40004 SQL Injection Fingerprinting
|
40005 SQL Injection
|
40006 MS SQL Injection Enumeration
|
40007 Oracle SQL Injection Enumeration
|
40008 Parameter tampering
|
40009 Server side include
|
40010 Cross site scripting in TAG
|
40011 Cross Site Scripting in TAG Attribute
|
40012 CSRF Token missing
|
40013 Session Fixation
|
40014 Persistent XSS (Attack)
|
40015 LDAP Injection
|
40016 Persistent XSS (Prime)
|
40017 Persistent XSS (Spider)
|
40018 SQL Injection
|
40019 SQL Injection MySQL
|
40020 SQL Injection Hypersonic
|
40021 SQL Injection Oracle
|
40022 SQL Injection Postgresql
|
40023 Username Enumeration
|
40024 Method Scanner
|
|
50000 Active Scan scripts
|
50001 Passive Scan scripts
|
|
60000 Example simple passive rule
|
60001 Example file passive rule
|
60100 Example simple active rule
|
60101 Example file active rule
|
|
90018 SQL Injection SQLMap
|
90019 Code Injection
|
90020 Command Injection
|
90021 Xpath Injection
|
90022 Application Error scanner
|
90023 XXE External Entity
|
90024 Generic Padding Oracle
|
90025 Expression Language Injection
|
|
90027 Cookie Slack Detector
|
| 90028 Insecure HTTP Method |