Supported DAST detectors The detectors for Dynamic Application Security Testing (DAST) listed below are classified by their Kind. Access Control Access Control Issue - Improper Authentication Access Control Issue - Improper Authorization Bypassing 403 CORS Header Cross-Domain JavaScript Source File Inclusion Cross-Domain Misconfiguration Fetch Metadata Request Headers Insecure HTTP Method Insufficient Site Isolation Against Spectre Vulnerability Permissions Policy Header Not Set Authentication Authentication Request Identified JWT Scan Rule Possible Username Enumeration Use of SAML Username Hash Found Weak Authentication Method Buffer Overflow Buffer Overflow CRLF Injection CRLF Injection Clickjacking Anti-clickjacking Header Code Injection Server Side Code Injection Cross-Site Request Forgery Absence of Anti-CSRF Tokens Anti-CSRF Tokens Check Cross Site Request Forgery Cross-Site Scripting Cross-site Scripting Cross Site Scripting (DOM Based) Cross Site Scripting (Persistent) Cross Site Scripting (Persistent) - Prime Cross Site Scripting (Persistent) - Spider Cross Site Scripting (Reflected) Dangerous JS Functions Out of Band XSS User Controllable HTML Element Attribute (Potential XSS) User Controllable JavaScript Event (XSS) Web Browser XSS Protection Not Enabled File Inclusion File Upload Remote File Inclusion Fingerprinting Client-Side Data Flow GraphQL Modern Web Application Retrieved from Cache Tech Detection Passive Scanner User Agent Fuzzer Verification Request Identified ZAP is Out of Date Information Disclosure Application Error Disclosure Backup File Disclosure Base64 Disclosure Cloud Metadata Potentially Exposed Directory Browsing ELMAH Information Leak .env Information Leak Hash Disclosure - MD4 / MD5 Hidden File Found .htaccess Information Leak HTTP Server Response Header Image Exposes Location or Privacy Data In Page Banner Information Leak Information Disclosure - Debug Error Messages Information Disclosure - Sensitive Information in HTTP Referrer Header Information Disclosure - Sensitive Information in URL Information Disclosure - Suspicious Comments PII Disclosure Private IP Disclosure Proxy Disclosure Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) Source Code Disclosure - CVE-2012-1823 Source Code Disclosure - File Inclusion Source Code Disclosure - Git Source Code Disclosure - PHP Source Code Disclosure - SVN Source Code Disclosure - /WEB-INF Folder Spring Actuator Information Leak Timestamp Disclosure - Unix Trace.axd Information Leak WSDL File Detection X-AspNet-Version Response Header X-Backend-Server Header Information Leak X-ChromeLogger-Data (XCOLD) Header Information Leak X-Debug-Token Information Leak Injection Advanced SQL Injection Exponential Entity Expansion (Billion Laughs Attack) Expression Language Injection Format String Error Generic Padding Oracle HTTP Parameter Override HTTP Parameter Pollution Integer Overflow Error LDAP Injection NoSQL Injection - MongoDB NoSQL Injection - MongoDB (Time Based) Parameter Tampering SOAP Action Spoofing SOAP XML Injection SQL Injection SQL Injection - Hypersonic SQL (Time Based) SQL Injection - MsSQL (Time Based) SQL Injection - MySQL (Time Based) SQL Injection - Oracle (Time Based) SQL Injection - PostgreSQL (Time Based) SQL Injection - SQLite (Time Based) XPath Injection XSLT Injection OS Command Injection Remote OS Command Injection Remote OS Command Injection (Time Based) Path Traversal Path Traversal Redirect Big Redirect Detected (Potential Sensitive Information Leak) External Redirect Off-site Redirect Remote Code Execution Java Serialization Object Log4Shell Remote Code Execution - CVE-2012-1823 Remote Code Execution (React2Shell) Remote Code Execution - Shell Shock Spring4Shell Text4shell (CVE-2022-42889) Security Misconfiguration Apache Range Header DoS (CVE-2011-3192) Charset Mismatch Content Cacheability Content Security Policy (CSP) Header Not Set Content-Type Header Missing CSP Heartbleed OpenSSL Vulnerability Heartbleed OpenSSL Vulnerability (Indicative) HTTP Only Site HTTP to HTTPS Insecure Transition in Form Post Httpoxy - Proxy Header Misuse HTTPS Content Available via HTTP HTTPS to HTTP Insecure Transition in Form Post Insecure Component Re-examine Cache-control Directives Relative Path Confusion Reverse Tabnabbing Script Served From Malicious Domain (polyfill) Secure Pages Include Mixed Content Strict-Transport-Security Header Sub Resource Integrity Attribute Missing User Controllable Charset Vulnerable JS Library Web Cache Deception X-Content-Type-Options Header Missing Server-Side Include Injection Server Side Include Server-Side Request Forgery Server Side Request Forgery Server-Side Template Injection Server Side Template Injection Server Side Template Injection (Blind) Session Fixation Session Fixation Session Management Cookie No HttpOnly Flag Cookie Poisoning Cookie Slack Detector Cookie without SameSite Attribute Cookie Without Secure Flag GET for POST Insecure JSF ViewState Loosely Scoped Cookie Session ID in URL Rewrite Session Management Response Identified Viewstate XML External Entity XML External Entity Attack