🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Weak Credentials
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.3.2229
Weak Credentials
This page lists
38 vulnerabilities
in this category.
Critical: 1
High: 24
Medium: 11
Low: 1
Information: 1
Vulnerability Name
CVE
CWE
Severity
ASP.NET ViewState Weak Validation Key
-
CWE-321
Critical
BottlePy weak secret key
-
CWE-693
High
Weak WordPress security key
-
CWE-16
High
Symfony weak application secret
-
CWE-94
High
Unrestricted access to Haproxy Data Plane API
-
CWE-200
High
Symfony RCE via weak/predictable APP_SECRET
-
CWE-94
High
SonarQube default credentials
-
CWE-798
High
Apache Tapestry weak secret key
-
CWE-693
High
Ruby framework weak secret key
-
CWE-693
High
Oracle PeopleSoft SSO weak secret key
-
CWE-693
High
Devise weak password
-
CWE-200
High
JWT Signature Bypass via None Algorithm
-
CWE-345
High
Apache Axis2 administration console weak password
-
CWE-200
High
Ruby on Rails weak/known secret token
CVE-2013-0156
CWE-200
High
Webmail weak password
-
CWE-200
High
GlassFish admin console weak credentials
-
CWE-693
High
IBM WebSphere administration console weak password
-
CWE-200
High
Jenkins weak password
-
CWE-200
High
SAP weak/predictable user credentials
-
CWE-200
High
Weak password
-
CWE-200
High
WebLogic admin console weak credentials
-
CWE-693
High
Weak Secret is Used to Sign JWT
-
CWE-345
High
Web application default/weak credentials
-
CWE-200
High
PrimeFaces 5.x Expression Language injection
CVE-2017-1000486
-
High
phpLiteAdmin default password
-
CWE-200
High
Mojolicious weak secret key
-
CWE-693
Medium
Tornado weak secret key
-
CWE-693
Medium
Django weak secret key
-
CWE-693
Medium
Web2py weak secret key
-
CWE-693
Medium
Yii2 weak secret key
-
CWE-693
Medium
Laravel framework weak secret key
-
CWE-693
Medium
Play framework weak secret key
-
CWE-693
Medium
Pyramid framework weak secret key
-
CWE-693
Medium
Flask weak secret key
-
CWE-693
Medium
Express cookie-session weak secret key
-
CWE-693
Medium
Cookie signed with weak secret key
-
CWE-693
Medium
Jira Projects accessible anonymously
-
CWE-200
Low
Express express-session weak secret key
-
CWE-693
Information