🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Information Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Information Severity Vulnerabilities
Found
69 vulnerabilities
at
Information
severity.
Vulnerability Name
CVE
CWE
Severity
Generic Email Address Disclosure
-
CWE-200
Information
(Possible) Cross site scripting
-
CWE-79
Information
WebDAV Enabled
-
CWE-749
Information
Web server default welcome page
-
CWE-200
Information
Cross site scripting (requiring unencoded tag delimiter)
-
CWE-79
Information
Cross site scripting (requiring unencoded quote)
-
CWE-79
Information
.htaccess File Detected
-
CWE-529
Information
Access-Control-Allow-Origin header with wildcard (*) value
-
CWE-942
Information
File Upload Functionality Detected
-
-
Information
JVM version leakage
-
CWE-200
Information
Microsoft Frontpage configuration information
-
CWE-200
Information
Outdated JavaScript libraries
-
CWE-1395
Information
Web Application Firewall Detected
-
-
Information
WordPress readme.html file
-
CWE-200
Information
WordPress user registration enabled
-
-
Information
HTML Injection (requiring unencoded tag delimiter)
-
CWE-80
Information
[Possible] Internal Path Disclosure (*nix)
-
CWE-200
Information
[Possible] Internal Path Disclosure (Windows)
-
CWE-200
Information
[Possible] WS_FTP Log File Detected
-
CWE-538
Information
Error page web server version disclosure
-
CWE-200
Information
Content Security Policy (CSP) Not Implemented
-
CWE-1021
Information
Subresource Integrity (SRI) Not Implemented
-
CWE-830
Information
Express express-session weak secret key
-
CWE-693
Information
Reverse Proxy Detected
-
-
Information
HTTP Strict Transport Security (HSTS) Errors and Warnings
-
CWE-319
Information
Insecure Referrer Policy
-
CWE-200
Information
TLS/SSL (EC)DHE Key Reuse
-
CWE-327
Information
Javascript Source map detected
-
CWE-200
Information
Typo3 Admin publicly accessible
-
CWE-200
Information
Cookies with Secure flag set over insecure connection
-
CWE-614
Information
Content Security Policy Misconfiguration
-
CWE-358
Information
Permissions-Policy header not implemented
-
CWE-1021
Information
Retired hash function in SAML Response
-
CWE-327
Information
Deprecated Header Instruction Used to Implement Content Security Policy (CSP)
-
CWE-358
Information
Incorrect Content Security Policy (CSP) Implementation
-
CWE-942
Information
Invalid Content Security Policy (CSP) Directive Identified in meta Elements
-
CWE-358
Information
Content Security Policy (CSP) Keywords Not Used Within Single Quotes
-
CWE-942
Information
An Unsafe Content Security Policy (CSP) Directive in Use
-
CWE-942
Information
Nonce Usage Detected in Content Security Policy (CSP) Directive
-
CWE-358
Information
Content Security Policy (CSP) Nonce Without Matching Script Block
-
CWE-358
Information
Static Nonce Identified in Content Security Policy (CSP)
-
CWE-334
Information
default-src Used in Content Security Policy (CSP)
-
CWE-942
Information
Content Security Policy (CSP) report-uri Uses HTTP
-
CWE-319
Information
Content Security Policy (CSP) Contains Out of Scope report-uri Domain
-
CWE-358
Information
Wildcard Detected in Scheme Portion of Content Security Policy (CSP) Directive
-
CWE-942
Information
Wildcard Detected in Domain Portion of Content Security Policy (CSP) Directive
-
CWE-942
Information
Wildcard Detected in Port Portion of Content Security Policy (CSP) Directive
-
CWE-942
Information
Unsupported Hash Detected in Content Security Policy (CSP)
-
CWE-327
Information
Weak Nonce Detected in Content Security Policy (CSP) Declaration
-
CWE-330
Information
Multiple Content Security Policy (CSP) Implementation Detected
-
CWE-358
Information
Content Security Policy (CSP) Nonce Value Not Used Within Single Quotes
-
CWE-358
Information
No Script Block Detected with the Hash Value Declared in Content Security Policy (CSP)
-
CWE-942
Information
data: Used in a Content Security Policy (CSP) Directive
-
CWE-942
Information
Missing object-src in CSP Declaration
-
CWE-942
Information
Scheme URI Detected in Content Security Policy (CSP) Directive
-
CWE-942
Information
Insecure Protocol Detected in Content Security Policy (CSP)
-
CWE-942
Information
Content-Security-Policy-Report-Only Cannot Be Declared Without report-uri Directive
-
CWE-358
Information
Content-Security-Policy-Report-Only Cannot Be Declared Between META Tags
-
CWE-358
Information
Magento 2.0-2.3 End of life
-
CWE-1104
Information
LLM Model Detected
-
CWE-200
Information
LLM Response Pattern Detected
-
CWE-200
Information
X-Content-Type-Options (XCTO) Not Implemented
-
-
Information
Potential Sensitive Data Disclosure
-
-
Information
Apple's App-Site Association (AASA) file
-
CWE-200
Information
Cross-Origin Opener Policy (COOP) Syntax Error
-
CWE-1022
Information
Cross-Origin Opener Policy (COOP) Needs Improvements
-
CWE-1022
Information
Cross-Origin Opener Policy (COOP) Not Implemented
-
CWE-1022
Information
Oracle JRE CVE-2012-0547 Vulnerability (CVE-2012-0547)
CVE-2012-0547
-
Information
Oracle JRE Other Vulnerability (CVE-2012-5085)
CVE-2012-5085
-
Information