To invoke "Vulnerability Details" panel, you must click over a particular vulnerability:

Here are the set of options available to inspect the selected vulnerability:

Details and Fix
|
Show details about the selected vulnerability, including description, possible fix options, references, etc.
|
Why is it an issue?
|
This section attempts to explain deeply the details of how this vulnerability has been uncovered by N-Stalker's engine.
|
Browser Details
|
This section allows you to load the server's response in a web browser. You may either load the cached response or attempt to re-issue the request online.
|
HTTP Request
|
This section allows you to investigate the HTTP request sent to the server.
|
HTTP Response
|
This section allows you to investigate the HTTP response received from the server.
|
Simulation Engine
|
Simulation engine is a tool that allows you to reconstruct the attack request and investigate server response in real-time.
|
|