Web Application Vulnerabilities Index

This page lists X vulnerabilities classified as WASC-20 that can be detected by Invicti.

Vulnerability Name
Classification
Severity
Form Hijacking
CWE-20
, 
ISO27001-A.14.2.5
, 
OWASP 2013-A1
, 
OWASP 2017-A1
, 
WASC-20
, 
Low
SAML Consumer Service KeyInfo RetrievalMethod SSRF
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
, 
CWE-918
, 
ISO27001-A.14.2.5
, 
OWASP 2013-A1
, 
OWASP 2017-A1
, 
WASC-20
, 
Medium
Server-Side Request Forgery
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
, 
CWE-918
, 
ISO27001-A.14.2.5
, 
OWASP 2013-A1
, 
OWASP 2017-A1
, 
WASC-20
, 
Medium
Server-Side Request Forgery (Time Based)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
, 
CWE-918
, 
ISO27001-A.14.2.5
, 
OWASP 2013-A1
, 
OWASP 2017-A1
, 
WASC-20
, 
Medium
User Controllable Cookie
CWE-20
, 
ISO27001-A.14.2.5
, 
WASC-20
, 
Low