🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Invicti vs. Competitors
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
MSSP
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
X
vulnerabilities classified as ISO27001-A.14.2.5 that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Select Vulnerability
Vulnerability Name
Classification
Severity
aah Go Server Identified
aah Go Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
AbanteCart Detected
AbanteCart Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
actionhero.js Identified
actionhero.js Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ActiveMQ - Remote Code Execution (CVE-2023-46604)
ActiveMQ - Remote Code Execution (CVE-2023-46604)
CAPEC-242
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Adminer Detected
Adminer Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Ampache Detected
Ampache Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Angular Identified
Angular Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Angularjs Identified
Angularjs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
An Unsafe Content Security Policy (CSP) Directive in Use
An Unsafe Content Security Policy (CSP) Directive in Use
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
Information
Apache Coyote Identified
Apache Coyote Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Module Identified
Apache Module Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Shiro Identified
Apache Shiro Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Traffic Server Identified
Apache Traffic Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Web Server Identified
Apache Web Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Artifactory DevOps Solution Identified
Artifactory DevOps Solution Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ASP.NET Identified
ASP.NET Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ASP.NET MVC Identified
ASP.NET MVC Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
AspNetSignalR Identified
AspNetSignalR Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Atlassian Confluence Identified
Atlassian Confluence Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Atlassian Jira Identified
Atlassian Jira Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Atlassian Proxy Identified
Atlassian Proxy Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ATutor Detected
ATutor Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
AWStats Detected
AWStats Detected
CAPEC-224
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-45
,Â
Information
Axios Identified
Axios Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Axway Secure Transport Detected
Axway Secure Transport Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
Information
Axway SecureTransport Server Identified
Axway SecureTransport Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
b2evolution Detected
b2evolution Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Backbonejs Identified
Backbonejs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Base Tag Hijacking
Base Tag Hijacking
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
,Â
CWE-20
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
Medium
Bash Command Injection Vulnerability (Shellshock Bug)
Bash Command Injection Vulnerability (Shellshock Bug)
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
BitNinja Captcha Server Identified
BitNinja Captcha Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Blind Command Injection
Blind Command Injection
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Blind Cross-site Scripting
Blind Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Blind SQL Injection
Blind SQL Injection
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Bluebird Identified
Bluebird Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Bomgar Remote Support Software Detected
Bomgar Remote Support Software Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Boolean Based SQL Injection
Boolean Based SQL Injection
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Bootbox Identified
Bootbox Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Bootstrap3DateTimePicker Identified
Bootstrap3DateTimePicker Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Bootstrapjs Identified
Bootstrapjs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
BootstrapSelect Identified
BootstrapSelect Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
BootstrapTable Identified
BootstrapTable Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
BootstrapToggle Identified
BootstrapToggle Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
BootstrapTypeahead Identified
BootstrapTypeahead Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Caddy Web Server Identified
Caddy Web Server Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
CakePHP Framework Identified
CakePHP Framework Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
CanvasJS Identified
CanvasJS Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Chamilo Detected
Chamilo Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Chartjs Identified
Chartjs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Cherokee Identified
Cherokee Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
CherryPy Identified
CherryPy Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Ckeditor Identified
Ckeditor Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Claroline Detected
Claroline Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ClipBucket Detected
ClipBucket Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Code Evaluation (Apache Struts)
Code Evaluation (Apache Struts)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/RL:O
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts S02-53)
Code Evaluation (Apache Struts S02-53)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-016
Code Evaluation (Apache Struts) S2-016
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/RL:O
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-045
Code Evaluation (Apache Struts) S2-045
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/RL:O
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-046
Code Evaluation (Apache Struts) S2-046
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/RL:O
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (ASP)
Code Evaluation (ASP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Node.js)
Code Evaluation (Node.js)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Perl)
Code Evaluation (Perl)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (PHP)
Code Evaluation (PHP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (PHP) - IAST
Code Evaluation (PHP) - IAST
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Python)
Code Evaluation (Python)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (RoR)
Code Evaluation (RoR)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Code Evaluation (RoR - JSON)
Code Evaluation (RoR - JSON)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Code Evaluation (Ruby)
Code Evaluation (Ruby)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation via Local File Inclusion (PHP)
Code Evaluation via Local File Inclusion (PHP)
CAPEC-251
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-33
,Â
Critical
Code Execution via File Upload
Code Execution via File Upload
CAPEC-210
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-42
,Â
Critical
Code Execution via Local File Inclusion
Code Execution via Local File Inclusion
CAPEC-170
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-33
,Â
Critical
Code Execution via SSTI
Code Execution via SSTI
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (ASP.NET Razor)
Code Execution via SSTI (ASP.NET Razor)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Java FreeMarker)
Code Execution via SSTI (Java FreeMarker)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
1