Get a demo
Get a demo
Product
Overview
Features
Why Invicti?
Solutions
INDUSTRIES
IT & Telecom
Government
Financial
Education
Healthcare
ROLES
CTO & CISO
Engineering Manager
Security Engineer
DevSecOps
Comparison
Case studies
Customers
Testimonials
Pricing
About Us
Our Story
In the news
Careers
Contact us
Resources
Blog
White Papers
Buyer's Guide
Resource Library
Partners
Support
Home
Support
Issues
Issues
Contact Support
OPEN A TICKET
Working With Issues
Managing Issues
The Issue Lifecycle
Viewing Issues in Invicti Enterprise
Issues lists
Issue page fields
Viewing issues in Invicti Enterprise
Viewing Issues in Invicti Standard
How to View an Issue in Invicti Standard
How to View an Issue in a Browser in Invicti Standard
Generating Exploits for Vulnerabilities in Invicti Standard
Vulnerability Severity Levels
Exporting a Vulnerability to an Issue Tracking System
How to Export a Vulnerability in Invicti Enterprise
How to Export a Vulnerability in Invicti Standard
Assigning an Issue to Another Team Member
How to Assign an Issue to Another Team Member in Netsparker Enterprise
Disabling the Assigning of Issues in Invicti to the Code Committer
How to Disable the Assigning of Issues in Invicti to the Code Committer
Viewing the HTTP Request and Response of an Issue
How to View the HTTP Request and Response of an Issue in Netsparker Enterprise
How to View the HTTP Request and Response of an Issue in Netsparker Standard
Updating the Status of an Issue in Invicti Enterprise
How to Update the State of an Issue
How to Mark a Vulnerability as Fixed
Tagging in Invicti Enterprise
Tagging scans in Invicti Enterprise
Tagging websites in Invicti Enterprise
Tagging discovered websites in Invicti Enterprise
Tagging issues in Invicti Enterprise
Technologies
Technologies
Active Technologies
Fixed Technologies
Technologies dashboard
Recent Technologies
Technologies FAQ
How Invicti identifies Out-of-date Technologies
Vulnerability Database
How Invicti Identifies Out-of-date Version
Fingerprinting Libraries
Which JavaScript Libraries Do Invicti Scanners Detect?
Fingerprinting Off-the-Shelf Web Applications
Detecting Log4j vulnerability with Invicti
Detecting the Log4j vulnerability with Invicti Enterprise
Detecting the Log4j vulnerability with Invicti Standard
Log4J FAQ
Q: How do I ensure my Java application is not vulnerable to Log4Shell?
Q: What is the fastest way for Invicti to scan for vulnerable Log4j implementations?
Q: Do Invicti products detect Log4Shell?
Q: How do Invicti products detect Log4j?
Q: How can I tell Invicti DAST probing attempts from an actual attack?
Q: Do Invicti products use Log4j?
Q: How do I ensure my Invicti products do not call a vulnerable version of Log4j?
Q: Does Invicti scan for Log4j CVE-2021-44832?
CONTACT SUPPORT
OPEN A TICKET
TOP ARTICLES
What is Invicti?
Overview of Scan Policies
Scheduling Scans
Managing Integrations
Built-In Reports
CATEGORIES
Getting Started
Your Account
Settings
Scans
Issues
Notifications
Integrations
Reports
Team Management
Highly accurate, fast & easy-to-use Web Application Security Scanner
Get a demo