Alert Tag: POLICY_PENTEST

POLICY_PENTEST

All of the alerts which use this tag:
ID Alert Status Risk Type
0 Directory Browsing release Medium Active
2 Private IP Disclosure release Low Passive
3-1 Session ID in URL Rewrite release Medium Passive
3-2 Session ID in URL Rewrite release Medium Passive
3-3 Referer Exposes Session ID release Medium Passive
6-1 Path Traversal release High Active
6-2 Path Traversal release High Active
6-3 Path Traversal release High Active
6-4 Path Traversal release High Active
6-5 Path Traversal release High Active
7 Remote File Inclusion release High Active
41 Source Code Disclosure - Git beta High Active
42 Source Code Disclosure - SVN beta Medium Active
43 Source Code Disclosure - File Inclusion beta High Active
10003 Vulnerable JS Library release Medium Passive
10009 In Page Banner Information Leak release Low Passive
10010 Cookie No HttpOnly Flag release Low Passive
10011 Cookie Without Secure Flag release Low Passive
10015 Re-examine Cache-control Directives release Informational Passive
10017 Cross-Domain JavaScript Source File Inclusion release Low Passive
10019-1 Content-Type Header Missing release Informational Passive
10019-2 Content-Type Header Empty release Informational Passive
10020-1 Missing Anti-clickjacking Header release Medium Passive
10020-2 Multiple X-Frame-Options Header Entries release Medium Passive
10020-3 X-Frame-Options Defined via META (Non-compliant with Spec) release Medium Passive
10020-4 X-Frame-Options Setting Malformed release Medium Passive
10021 X-Content-Type-Options Header Missing release Low Passive
10023 Information Disclosure - Debug Error Messages release Low Passive
10024 Information Disclosure - Sensitive Information in URL release Informational Passive
10025 Information Disclosure - Sensitive Information in HTTP Referrer Header release Informational Passive
10026 HTTP Parameter Override beta Medium Passive
10027 Information Disclosure - Suspicious Comments release Informational Passive
10028 Off-site Redirect release High Passive
10029 Cookie Poisoning release Informational Passive
10030 User Controllable Charset release Informational Passive
10031 User Controllable HTML Element Attribute (Potential XSS) release Informational Passive
10032-1 Potential IP Addresses Found in the Viewstate release Medium Passive
10032-2 Emails Found in the Viewstate release Medium Passive
10032-3 Old Asp.Net Version in Use release Low Passive
10032-4 Viewstate without MAC Signature (Unsure) release High Passive
10032-5 Viewstate without MAC Signature (Sure) release High Passive
10032-6 Split Viewstate in Use release Informational Passive
10033 Directory Browsing release Medium Passive
10034 Heartbleed OpenSSL Vulnerability (Indicative) release High Passive
10035-1 Strict-Transport-Security Header Not Set release Low Passive
10035-2 Strict-Transport-Security Disabled release Low Passive
10035-3 Strict-Transport-Security Multiple Header Entries (Non-compliant with Spec) release Low Passive
10035-4 Strict-Transport-Security Header on Plain HTTP Response release Informational Passive
10035-5 Strict-Transport-Security Missing Max-Age (Non-compliant with Spec) release Low Passive
10035-6 Strict-Transport-Security Defined via META (Non-compliant with Spec) release Low Passive
10035-7 Strict-Transport-Security Max-Age Malformed (Non-compliant with Spec) release Low Passive
10035-8 Strict-Transport-Security Malformed Content (Non-compliant with Spec) release Low Passive
10036-1 Server Leaks its Webserver Application via "Server" HTTP Response Header Field release Informational Passive
10036-2 Server Leaks Version Information via "Server" HTTP Response Header Field release Low Passive
10037 Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) release Low Passive
10038-1 Content Security Policy (CSP) Header Not Set release Medium Passive
10038-2 Obsolete Content Security Policy (CSP) Header Found release Informational Passive
10038-3 Content Security Policy (CSP) Report-Only Header Found release Informational Passive
10039 X-Backend-Server Header Information Leak release Low Passive
10040 Secure Pages Include Mixed Content release Low Passive
10041 HTTP to HTTPS Insecure Transition in Form Post release Medium Passive
10042 HTTPS to HTTP Insecure Transition in Form Post release Medium Passive
10043 User Controllable JavaScript Event (XSS) release Informational Passive
10044-1 Big Redirect Detected (Potential Sensitive Information Leak) release Low Passive
10044-2 Multiple HREFs Redirect Detected (Potential Sensitive Information Leak) release Low Passive
10045-1 Source Code Disclosure - /WEB-INF Folder release High Active
10045-2 Properties File Disclosure - /WEB-INF folder release High Active
10047 HTTPS Content Available via HTTP release Low Active
10048-1 Remote Code Execution - Shell Shock release High Active
10048-2 Remote Code Execution - Shell Shock release High Active
10049-1 Non-Storable Content beta Informational Passive
10049-2 Storable but Non-Cacheable Content beta Informational Passive
10049-3 Storable and Cacheable Content beta Informational Passive
10050-1 Retrieved from Cache release Informational Passive
10050-2 Retrieved from Cache release Informational Passive
10051 Relative Path Confusion beta Medium Active
10052 X-ChromeLogger-Data (XCOLD) Header Information Leak release Medium Passive
10054-1 Cookie without SameSite Attribute release Low Passive
10054-2 Cookie with SameSite Attribute None release Low Passive
10054-3 Cookie with Invalid SameSite Attribute release Low Passive
10055-1 CSP: X-Content-Security-Policy release Low Passive
10055-2 CSP: X-WebKit-CSP release Low Passive
10055-3 CSP: Notices release Low Passive
10055-4 CSP: Wildcard Directive release Medium Passive
10055-5 CSP: script-src unsafe-inline release Medium Passive
10055-6 CSP: style-src unsafe-inline release Medium Passive
10055-7 CSP: script-src unsafe-hashes release Medium Passive
10055-8 CSP: style-src unsafe-hashes release Medium Passive
10055-9 CSP: Malformed Policy (Non-ASCII) release Medium Passive
10055-10 CSP: script-src unsafe-eval release Medium Passive
10055-11 CSP: Meta Policy Invalid Directive release Medium Passive
10055-12 CSP: Header & Meta release Informational Passive
10055-13 CSP: Failure to Define Directive with No Fallback release Medium Passive
10056 X-Debug-Token Information Leak release Low Passive
10057 Username Hash Found release Informational Passive
10058 GET for POST release Informational Active
10061 X-AspNet-Version Response Header release Low Passive
10062 PII Disclosure release High Passive
10063-1 Permissions Policy Header Not Set beta Low Passive
10063-2 Deprecated Feature Policy Header Set beta Low Passive
10094-1 ASP.NET ViewState Disclosure alpha Informational Passive
10094-2 ASP.NET ViewState Integrity alpha High Passive
10094-3 Base64 Disclosure alpha Informational Passive
10095 Backup File Disclosure beta Medium Active
10096 Timestamp Disclosure - Unix release Low Passive
10097-1 Hash Disclosure - LanMan / DES release High Passive
10097-2 Hash Disclosure - Kerberos AFS DES release High Passive
10097-3 Hash Disclosure - OpenBSD Blowfish release High Passive
10097-4 Hash Disclosure - MD5 Crypt release High Passive
10097-5 Hash Disclosure - SHA-256 Crypt release High Passive
10097-6 Hash Disclosure - SHA-512 Crypt release High Passive
10097-7 Hash Disclosure - BCrypt release High Passive
10097-8 Hash Disclosure - NTLM release High Passive
10097-9 Hash Disclosure - Salted SHA-1 release Low Passive
10097-10 Hash Disclosure - SHA-512 release Low Passive
10097-11 Hash Disclosure - SHA-384 release Low Passive
10097-12 Hash Disclosure - SHA-256 release Low Passive
10097-13 Hash Disclosure - SHA-224 release Low Passive
10097-14 Hash Disclosure - SHA-1 release Low Passive
10097-15 Hash Disclosure - LanMan release Low Passive
10097-16 Hash Disclosure - MD4 / MD5 release Low Passive
10098 Cross-Domain Misconfiguration release Medium Passive
10099 Source Code Disclosure - PHP beta Medium Passive
10103 Image Exposes Location or Privacy Data beta Informational Passive
10104 User Agent Fuzzer release Informational Active
10105-1 Authentication Credentials Captured release Medium Passive
10105-2 Weak Authentication Method release Medium Passive
10106 HTTP Only Site release Medium Active
10107 Httpoxy - Proxy Header Misuse beta High Active
10108 Reverse Tabnabbing release Medium Passive
10109 Modern Web Application release Informational Passive
10110 Dangerous JS Functions beta Low Passive
10115-1 Script Served From Malicious Domain (polyfill) release High Passive
10115-2 Script Served From Malicious Domain (polyfill) release High Passive
10202 Absence of Anti-CSRF Tokens release Medium Passive
10205-1 HTTPS Configuration alpha Informational Active
10205-2 HTTPS Security Configuration Issues alpha High Active
20012 Anti-CSRF Tokens Check beta Medium Active
20014 HTTP Parameter Pollution beta Informational Active
20015 Heartbleed OpenSSL Vulnerability release High Active
20016-1 Cross-Domain Misconfiguration - Adobe - Read beta High Active
20016-2 Cross-Domain Misconfiguration - Adobe - Send beta High Active
20016-3 Cross-Domain Misconfiguration - Silverlight beta High Active
20017 Source Code Disclosure - CVE-2012-1823 release High Active
20018 Remote Code Execution - CVE-2012-1823 release High Active
20019-1 External Redirect release High Active
20019-2 External Redirect release High Active
20019-3 External Redirect release High Active
20019-4 External Redirect release High Active
30001 Buffer Overflow release Medium Active
30002 Format String Error release Medium Active
30003 Integer Overflow Error beta Medium Active
40003 CRLF Injection release Medium Active
40008 Parameter Tampering release Medium Active
40009 Server Side Include release High Active
40012 Cross Site Scripting (Reflected) release High Active
40013-1 Session ID Transmitted Insecurely beta Medium Active
40013-2 Session ID Cookie Accessible to JavaScript beta Low Active
40013-3 Session ID Expiry Time/Max-Age is Excessive beta High Active
40013-4 Session Fixation beta Informational Active
40013-5 Exposed Session ID beta Medium Active
40013-6 Session Fixation beta Medium Active
40014-1 Cross Site Scripting (Persistent) release High Active
40014-2 Cross Site Scripting Weakness (Persistent in JSON Response) release Low Active
40014-3 Cross Site Scripting (Persistent) release High Active
40015 LDAP Injection alpha High Active
40016 Cross Site Scripting (Persistent) - Prime release Informational Active
40017 Cross Site Scripting (Persistent) - Spider release Informational Active
40018 SQL Injection release High Active
40019 SQL Injection - MySQL (Time Based) release High Active
40020 SQL Injection - Hypersonic SQL (Time Based) release High Active
40021 SQL Injection - Oracle (Time Based) release High Active
40022 SQL Injection - PostgreSQL (Time Based) release High Active
40023 Possible Username Enumeration beta Informational Active
40024-1 SQL Injection - SQLite (Time Based) alpha High Active
40024-2 SQL Injection - SQLite (Time Based) alpha High Active
40025-1 Proxy Disclosure beta High Active
40025-2 Proxy Disclosure beta Medium Active
40027 SQL Injection - MsSQL (Time Based) release High Active
40028 ELMAH Information Leak release Medium Active
40029 Trace.axd Information Leak release Medium Active
40031 Out of Band XSS beta High Active
40032 .htaccess Information Leak release Medium Active
40033 NoSQL Injection - MongoDB beta High Active
40034 .env Information Leak release Medium Active
40035 Hidden File Found release Medium Active
40038 Bypassing 403 beta Medium Active
40039 Web Cache Deception alpha Medium Active
40040-1 CORS Header beta Informational Active
40040-2 CORS Misconfiguration beta Medium Active
40040-3 CORS Misconfiguration beta High Active
40042 Spring Actuator Information Leak release Medium Active
40043-1 Log4Shell (CVE-2021-44228) release High Active
40043-2 Log4Shell (CVE-2021-45046) release High Active
40044 Exponential Entity Expansion (Billion Laughs Attack) release Medium Active
40045 Spring4Shell release High Active
40046 Server Side Request Forgery beta High Active
40047 Text4shell (CVE-2022-42889) beta High Active
40048 Remote Code Execution (React2Shell) release High Active
90001 Insecure JSF ViewState release Medium Passive
90002 Java Serialization Object release Medium Passive
90003 Sub Resource Integrity Attribute Missing release Medium Passive
90004-1 Cross-Origin-Resource-Policy Header Missing or Invalid beta Low Passive
90004-2 Cross-Origin-Embedder-Policy Header Missing or Invalid beta Low Passive
90004-3 Cross-Origin-Opener-Policy Header Missing or Invalid beta Low Passive
90005-1 Sec-Fetch-Site Header is Missing alpha Informational Passive
90005-2 Sec-Fetch-Mode Header is Missing alpha Informational Passive
90005-3 Sec-Fetch-Dest Header is Missing alpha Informational Passive
90005-4 Sec-Fetch-User Header is Missing alpha Informational Passive
90005-5 Sec-Fetch-Site Header Has an Invalid Value alpha Informational Passive
90005-6 Sec-Fetch-Mode Header Has an Invalid Value alpha Informational Passive
90005-7 Sec-Fetch-Dest Header Has an Invalid Value alpha Informational Passive
90005-8 Sec-Fetch-User Header Has an Invalid Value alpha Informational Passive
90011-1 Charset Mismatch (Header Versus Meta Content-Type Charset) release Informational Passive
90011-2 Charset Mismatch (Header Versus Meta Charset) release Informational Passive
90011-3 Charset Mismatch (Meta Charset Versus Meta Content-Type Charset) release Informational Passive
90011-4 Charset Mismatch release Informational Passive
90017 XSLT Injection release Medium Active
90018 Advanced SQL Injection beta High Active
90019-1 Server Side Code Injection - PHP Code Injection release High Active
90019-2 Server Side Code Injection - ASP Code Injection release High Active
90020 Remote OS Command Injection release High Active
90021 XPath Injection release High Active
90022 Application Error Disclosure release Medium Passive
90023 XML External Entity Attack release High Active
90024 Generic Padding Oracle release High Active
90025 Expression Language Injection beta High Active
90026 SOAP Action Spoofing beta High Active
90027 Cookie Slack Detector beta Informational Active
90028-1 Insecure HTTP Method - DELETE beta Medium Active
90028-2 Insecure HTTP Method - PUT beta Medium Active
90028-3 Insecure HTTP Method - TRACE beta Medium Active
90028-4 Insecure HTTP Method - CONNECT beta Medium Active
90028-5 Insecure HTTP Method - PROPFIND beta Informational Active
90028-6 Insecure HTTP Method - PUT beta Medium Active
90029 SOAP XML Injection beta High Active
90030 WSDL File Detection beta Passive
90033 Loosely Scoped Cookie release Informational Passive
90034 Cloud Metadata Potentially Exposed release High Active
90035 Server Side Template Injection release High Active
90036 Server Side Template Injection (Blind) release High Active
90037 Remote OS Command Injection (Time Based) release High Active
90039 NoSQL Injection - MongoDB (Time Based) beta High Active
100043-1 Vulnerable Swagger UI Version Detected alpha High Script Active
100043-2 Exposed Secrets in Swagger/OpenAPI Path alpha High Script Active
100044-1 Suspicious Input Transformation - Quote Consumption alpha High Script Active
100044-2 Suspicious Input Transformation - Arithmetic Evaluation alpha High Script Active
100044-3 Suspicious Input Transformation - Expression Evaluation alpha High Script Active
100044-4 Suspicious Input Transformation - Template Evaluation alpha High Script Active
100044-5 Suspicious Input Transformation - EL Evaluation alpha High Script Active
100044-6 Suspicious Input Transformation - Unicode Normalisation alpha High Script Active
100044-7 Suspicious Input Transformation - URL Decoding Error alpha High Script Active
100044-8 Suspicious Input Transformation - Unicode Byte Truncation alpha High Script Active
100044-9 Suspicious Input Transformation - Unicode Case Conversion alpha High Script Active
100044-10 Suspicious Input Transformation - Unicode Combining Diacritic alpha High Script Active
110009 Full Path Disclosure alpha Low Passive