Web Application Security Checks
Checks
Syhunt's database is the culmination of years of research by Syhunt and includes checks for a extremely wide array of different web application security threats, as shown below.
| Check | CWE |
| Authentication Vulnerabilities | |
| Authentication Bypass / Broken Authentication | CWE-287 |
| Automated Authentication Brute Force (Form & HTTP-Based) | |
| Password Disclosure | CWE-311 |
| Unencrypted Login | CWE-319 |
| Weak Password Hashing | |
| Breach Confirmation | |
| Breach Confirmation through Dynamic Analysis | |
| Breach Confirmation through Source Code Analysis | |
| Breach Confirmation through Web Server Log Analysis | |
| Hidden Debug Parameter Discovery through Dynamic Analysis | |
| Hidden Debug Parameter Discovery through Source Code Analysis | |
| Hidden Debug Parameter Discovery and Injection through Hybrid Analysis | |
| Inappropriate Content Detection | |
| Malicious Content Detection | |
| Web-Based Backdoor Detection through Dynamic Analysis | |
| Web-Based Backdoor Detection through Source Code Analysis | |
| Command Execution | CWE-78 |
| Command Execution through Dynamic Analysis | |
| Command Execution through Source Code Analysis | |
| Cross-Site Scripting (XSS) | CWE-79 |
| Cross-Site Scripting (XSS) through Dynamic Analysis | |
| Cross-Site Scripting (XSS) through Source Code Analysis | |
| Weak XSS Filter/Validation Bypass through Dynamic Analysis | |
| Weak XSS Filter/Validation Bypass through Source Code Analysis | |
| HTML5 Specific XSS | |
| File Inclusion | CWE-98 |
| Local File Inclusion (LFI) through Dynamic Analysis | |
| Remote File Inclusion (RFI) through Dynamic Analysis | |
| Local File Inclusion (LFI) through Source Code Analysis | |
| Remote File Inclusion (RFI) through Source Code Analysis | |
| NoSQL Injection | |
| NoSQL Injection through Dynamic Analysis (Error-Based) | |
| NoSQL Injection through Dynamic Analysis (Time-Based) | |
| NoSQL Injection through Source Code Analysis | |
| NoSQL Injection in MongoDB | |
| SQL Injection | CWE-89 |
| SQL Injection through Dynamic Analysis (Error-Based) | |
| SQL Injection through Dynamic Analysis (Blind) | |
| SQL Injection through Dynamic Analysis (Time-Based) | |
| SQL Injection through Source Code Analysis | |
| SQL Injection through Source Code Analysis (HQL) | |
| Code Injection | CWE-94 |
| Code Injection through Dynamic Analysis (Print-Based) | |
| Code Injection through Dynamic Analysis (Time-Based) | |
| Code Injection in ASP Classic | |
| Code Injection in ASP.NET | |
| Code Injection in Java/JSP | |
| Code Injection in Lua (Nginx, Apache, CGI-Lua, etc) | |
| Code Injection in Perl | |
| Code Injection in PHP | |
| Code Injection in Python | |
| Code Injection in Ruby | |
| Code Injection in Server-Side JavaScript | |
| Source Code Disclosure | CWE-540 |
| Source Code Disclosure through Injection | |
| Source Code Disclosure through Content Analysis | |
| Source Code Disclosure (ASP Classic) | |
| Source Code Disclosure (ASP.NET) | |
| Source Code Disclosure (Java/JSP) | |
| Source Code Disclosure (Lua) | |
| Source Code Disclosure (Perl) | |
| Source Code Disclosure (PHP) | |
| Source Code Disclosure (SSI) | |
| Extension Checking | |
| Double Extension Checking | |
| Common Backup Extensions | |
| Structure Brute Force | |
| Admin Pages | |
| Common Backup Files | |
| Common Backup Folders | |
| Database Disclosure | |
| Old/Backup Files | CWE-530 |
| Common Form Weaknesses | |
| Email Form Hijacking | |
| Hidden Price Form Field | |
| AutoComplete Enabled (in sensitive form inputs) | |
| Unencrypted Credit Card Transaction | |
| Denial-of-Service (DoS) | CWE-730 |
| Client-Side Denial-of-Service | |
| Denial-of-Service through Injection | |
| Buffer Overflow | CWE-120 |
| Multiple Disclosure Vulnerabilities | |
| Common Exposures | |
| Information Disclosure through Injection | CWE-200 |
| Information Disclosure through Content Analysis | CWE-200 |
| Information Disclosure through Source Code Analysis | CWE-497 |
| Internal IP Address Disclosure | CWE-200 |
| Path Disclosure through Injection | CWE-211 |
| Path Disclosure through Content Analysis | CWE-211 |
| Directory Listing | CWE-548 |
| Web Technology Disclosures | |
| Suspicious HTML Comments | |
| Log Forging | CWE-117 |
| Log Forging through Source Code Analysis | |
| XPath Injection | CWE-91 |
| XPath Injection through Dynamic Analysis | |
| XPath Injection through Source Code Analysis | |
| LDAP Injection | CWE-90 |
| LDAP Injection through Dynamic Analysis | |
| LDAP Injection through Source Code Analysis | |
| Unvalidated Redirects | CWE-601 |
| Unvalidated Redirects through Dynamic Analysis | |
| Unvalidated Redirects through Source Code Analysis | |
| CRLF Header Injection | CWE-93 |
| CRLF Header Injection through Dynamic Analysis | |
| CRLF Header Injection through Source Code Analysis | |
| Expression Language (EL) Injection | CWE-917 |
| Cookie Manipulation | |
| Cross Frame Scripting | CWE-352 |
| Dangerous Methods | CWE-749 |
| Default Content | CWE-276 |
| Directory Traversal | CWE-22 |
| Server-Specific Vulnerabilities in IIS, iPlanet & Others | |
| Server-Side Request Forgery | CWE-918 |
| Server-Side Includes (SSI) Injection | |
| XML Injection | CWE-661 |
| XML External Entity (XXE) Injection | CWE-827 |
| XML External Entity (XXE) Injection through Dynamic Analysis | |
| XML External Entity (XXE) Injection through Source Code Analysis | |
| Known Vulnerable Apps | |
| Known Vulnerable Apps (Apache Struts) | |
| Known Vulnerable Apps (ASP Classic) | |
| Known Vulnerable Apps (ASP.Net) | |
| Known Vulnerable Apps (ColdFusion) | |
| Known Vulnerable Apps (Dynamic HTML) | |
| Known Vulnerable Apps (Flash) | |
| Known Vulnerable Apps (Java / JSP) | |
| Known Vulnerable Apps (Perl) | |
| Known Vulnerable Apps (Python) | |
| Known Vulnerable Apps (Ruby) | |
| Known Vulnerable Apps (SSI) | |
| Known Vulnerable Apps (IIS) | |
Supported Server-Side Languages (DAST)
Supported Server-Side Languages (SAST)

Supported Databases (SQL Injection Detection)
| Access | |
| DB2 | |
| dbx | |
| Firebird/InterBase | |
| FrontBase | |
| Informix | |
| Ingres | |
| MaxDB | |
| mSQL | |
| MySQL | |
| Oracle | |
| Ovrimos | |
| PostgreSQL | |
| SQL Server | |
| SQLite | |
| Swish | |
| Sybase |
