🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Invicti vs. Competitors
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
MSSP
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
X
vulnerabilities classified as WASC-14 that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Apache Multiple Choices Enabled
Apache Multiple Choices Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Low
Apache MultiViews Enabled
Apache MultiViews Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Low
Apache Server-Info Detected
Apache Server-Info Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Apache Server-Status Detected
Apache Server-Status Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
ASP.NET Debugging Enabled
ASP.NET Debugging Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Information
Database User Has Admin Privileges
Database User Has Admin Privileges
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-267
,Â
ISO27001-A.9.2.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-14
,Â
High
Django Debug Mode Enabled
Django Debug Mode Enabled
CAPEC-214
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Exception Report Disclosure (Tomcat)
Exception Report Disclosure (Tomcat)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Express Development Mode Is Enabled
Express Development Mode Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Express express-session Weak Secret Key Detected
Express express-session Weak Secret Key Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-200
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
JavaMelody Interface Detected
JavaMelody Interface Detected
CAPEC-347
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Laravel Debug Mode Enabled
Laravel Debug Mode Enabled
CAPEC-214
,Â
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Node.js Web Application does not handle uncaughtException
Node.js Web Application does not handle uncaughtException
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-248
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Node.js Web Application does not handle unhandledRejection
Node.js Web Application does not handle unhandledRejection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-248
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
OPTIONS Method Enabled
OPTIONS Method Enabled
CAPEC-107
,Â
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Information
RoR Development Mode Enabled
RoR Development Mode Enabled
CAPEC-214
,Â
CWE-16
,Â
ISO27001-A.14.1.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (Apache MyFaces)
Stack Trace Disclosure (Apache MyFaces)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (Apache Shiro)
Stack Trace Disclosure (Apache Shiro)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (ASP.NET)
Stack Trace Disclosure (ASP.NET)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (CakePHP Framework)
Stack Trace Disclosure (CakePHP Framework)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (CherryPy)
Stack Trace Disclosure (CherryPy)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (ColdFusion)
Stack Trace Disclosure (ColdFusion)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (Django)
Stack Trace Disclosure (Django)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (Grails)
Stack Trace Disclosure (Grails)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (GraphQL)
Stack Trace Disclosure (GraphQL)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (Java)
Stack Trace Disclosure (Java)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (Laravel)
Stack Trace Disclosure (Laravel)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (Node.js)
Stack Trace Disclosure (Node.js)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (PHP)
Stack Trace Disclosure (PHP)
CAPEC-214
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.9.2.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Stack Trace Disclosure (Python)
Stack Trace Disclosure (Python)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (RoR)
Stack Trace Disclosure (RoR)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Stack Trace Disclosure (Ruby-Sinatra Framework)
Stack Trace Disclosure (Ruby-Sinatra Framework)
CAPEC-214
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-248
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Medium
Struts2 Development Mode Enabled
Struts2 Development Mode Enabled
CAPEC-214
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
TorchServe Management API Publicly Exposed
TorchServe Management API Publicly Exposed
CAPEC-212
,Â
CWE-200
,Â
HIPAA-164.312(a)(1)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.8
,Â
WASC-14
,Â
High
TRACE/TRACK Method Detected
TRACE/TRACK Method Detected
CAPEC-107
,Â
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Low
WordPress Setup Configuration File
WordPress Setup Configuration File
CAPEC-212
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/CR:H/IR:H/AR:H/MAV:N/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:N
,Â
CWE-665
,Â
HIPAA-164.312(a)(1)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.8
,Â
WASC-14
,Â
Medium
1