🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Test Files
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.3.2229
Test Files
This page lists
32 vulnerabilities
in this category.
High: 11
Medium: 14
Low: 5
Information: 2
Vulnerability Name
CVE
CWE
Severity
Possible database backup
-
CWE-538
High
Dotenv .env file
-
CWE-538
High
Symfony databases.yml configuration file
-
CWE-538
High
SVN Detected
-
CWE-538
High
Mercurial repository found
-
CWE-538
High
Configuration file disclosure
-
CWE-538
High
web.xml configuration file disclosure
-
CWE-538
High
Configuration file source code disclosure
-
CWE-538
High
GIT Detected exposed
-
CWE-527
High
Bazaar repository found
-
CWE-538
High
[Possible] Backup Source Code Detected
-
CWE-538
High
WordPress database credentials disclosure
-
CWE-538
Medium
JetBrains .idea project directory
-
CWE-538
Medium
Microsoft Access Database File Detected
-
CWE-538
Medium
Global.asa backup file found
-
CWE-538
Medium
Development configuration files
-
CWE-538
Medium
Laravel log file publicly accessible
-
CWE-538
Medium
Apache Tomcat sample files
-
CWE-538
Medium
npm log file publicly accessible (npm-debug.log)
-
CWE-200
Medium
apc.php page found
-
CWE-538
Medium
SQLite Database File Found
-
CWE-538
Medium
PHP-CS-Fixer cache file publicly accessible (.php_cs.cache)
-
CWE-200
Medium
PHPinfo pages
-
CWE-200
Medium
CVS Detected
-
CWE-527
Medium
[Possible] Backup Folder
-
CWE-538
Medium
Documentation files
-
CWE-538
Low
Joe Editor DEADJOE file
-
CWE-538
Low
Apache Tomcat hello.jsp XSS
CVE-2007-1355
CWE-79
Low
Possible sensitive files
-
CWE-200
Low
Typo3 sensitive files
-
CWE-200
Low
[Possible] WS_FTP Log File Detected
-
CWE-538
Information
WordPress readme.html file
-
CWE-200
Information