🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
144
vulnerabilities categorized as medium severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
aah Go Server Identified
aah Go Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
AbanteCart Detected
AbanteCart Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
actionhero.js Identified
actionhero.js Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Active Mixed Content over HTTPS
Active Mixed Content over HTTPS
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
ActiveMQ - Remote Code Execution (CVE-2023-46604)
ActiveMQ - Remote Code Execution (CVE-2023-46604)
CAPEC-242
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Adminer Detected
Adminer Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Administration Page Detected
Administration Page Detected
CAPEC-87
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-425
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-34
,Â
Information
AEM Detected
AEM Detected
CWE-205
,Â
ISO27001-A14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Ampache Detected
Ampache Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Angular Identified
Angular Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Angularjs Identified
Angularjs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Anonymous Ciphers Supported
Anonymous Ciphers Supported
CAPEC-117
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
,Â
CWE-311
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
Medium
An Unsafe Content Security Policy (CSP) Directive in Use
An Unsafe Content Security Policy (CSP) Directive in Use
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
Information
Apache Coyote Identified
Apache Coyote Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Module Identified
Apache Module Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Multiple Choices Enabled
Apache Multiple Choices Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Low
Apache MultiViews Enabled
Apache MultiViews Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Low
Apache OFBiz Authentication Bypass (CVE-2023-51467)
Apache OFBiz Authentication Bypass (CVE-2023-51467)
CWE-CWE-287
,Â
Critical
Apache OFBiz Log4Shell RCE
Apache OFBiz Log4Shell RCE
CWE-CWE-78
,Â
High
Apache OFBiz RCE (CVE-2024-32113/CVE-2024-36104/CVE-2024-38856)
Apache OFBiz RCE (CVE-2024-32113/CVE-2024-36104/CVE-2024-38856)
CWE-CWE-22
,Â
Critical
Apache OFBiz RCE (CVE-2024-45195)
Apache OFBiz RCE (CVE-2024-45195)
CWE-CWE-425
,Â
Critical
Apache OFBiz SOAPService Deserialization RCE
Apache OFBiz SOAPService Deserialization RCE
AV:N/AC:M/Au:N/C:C/I:C/A:C
,Â
CWE-CWE-502
,Â
High
Apache OFBiz SSRF (CVE-2023-50968)
Apache OFBiz SSRF (CVE-2023-50968)
CWE-CWE-918
,Â
High
Apache OFBiz SSRF (CVE-2024-45507)
Apache OFBiz SSRF (CVE-2024-45507)
CWE-CWE-918
,Â
Critical
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
AV:N/AC:M/Au:N/C:N/I:P/A:N
,Â
CWE-CWE-502
,Â
High
Apache Server-Info Detected
Apache Server-Info Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Apache Server-Status Detected
Apache Server-Status Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Apache Shiro Identified
Apache Shiro Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Struts Path traversal (S2-067/CVE-2024-53677, S2-066/CVE-2023-50164)
Apache Struts Path traversal (S2-067/CVE-2024-53677, S2-066/CVE-2023-50164)
CWE-CWE-434
,Â
Critical
Apache Traffic Server Identified
Apache Traffic Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apache Web Server Identified
Apache Web Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Apple’s App-Site Association (AASA) Detected
Apple’s App-Site Association (AASA) Detected
ISO27001-A.18.1.3
,Â
Information
Arbitrary File Creation Detected
Arbitrary File Creation Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
Arbitrary File Deletion Detected
Arbitrary File Deletion Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
Artifactory DevOps Solution Identified
Artifactory DevOps Solution Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ASP.NET Cookieless Authentication Is Enabled
ASP.NET Cookieless Authentication Is Enabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET Cookieless Session State Is Enabled
ASP.NET Cookieless Session State Is Enabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET CustomErrors Is Disabled
ASP.NET CustomErrors Is Disabled
CWE-16
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
ASP.NET Debugging Enabled
ASP.NET Debugging Enabled
CWE-16
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Information
ASP.NET: Failure To Require SSL For Authentication Cookies
ASP.NET: Failure To Require SSL For Authentication Cookies
CWE-16
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET Identified
ASP.NET Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ASP.NET Login Credentials Stored In Plain Text
ASP.NET Login Credentials Stored In Plain Text
CWE-312
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
ASP.NET MVC Identified
ASP.NET MVC Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
AspNetSignalR Identified
AspNetSignalR Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ASP.NET Tracing Is Enabled
ASP.NET Tracing Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
,Â
CWE-11
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
ASP.NET ValidateRequest Is Globally Disabled
ASP.NET ValidateRequest Is Globally Disabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET ViewStateUserKey Is Not Set
ASP.NET ViewStateUserKey Is Not Set
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Low
Atlassian Confluence Identified
Atlassian Confluence Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Atlassian Jira Identified
Atlassian Jira Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Atlassian Proxy Identified
Atlassian Proxy Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ATutor Detected
ATutor Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
CAPEC-114
,Â
115
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-425
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-1
,Â
High
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
CAPEC-114
,Â
115
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-287
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-1
,Â
High
Authorization Required
Authorization Required
ISO27001-A.9.4.1
,Â
Information
Autocomplete Enabled (Password Field)
Autocomplete Enabled (Password Field)
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Information
Autocomplete is Enabled
Autocomplete is Enabled
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Low
AWS Dockerrun Configuration File Detected
AWS Dockerrun Configuration File Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-527
,Â
ISO27001-A9.4.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Low
AWStats Detected
AWStats Detected
CAPEC-224
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-45
,Â
Information
Axios Identified
Axios Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Axis Development Mode Enabled in WEB-INF/server-config.wsdd
Axis Development Mode Enabled in WEB-INF/server-config.wsdd
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Axis system configuration listing enabled in WEB-INF/server-config.wsdd
Axis system configuration listing enabled in WEB-INF/server-config.wsdd
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Axway SecureTransport Server Identified
Axway SecureTransport Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
b2evolution Detected
b2evolution Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Backbonejs Identified
Backbonejs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Backup File Disclosure
Backup File Disclosure
CAPEC-87
,Â
CWE-530
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-34
,Â
Low
Backup Source Code Detected
Backup Source Code Detected
CAPEC-87
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-530
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-34
,Â
High
Base Tag Hijacking
Base Tag Hijacking
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
,Â
CWE-20
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
Medium
Bash Command Injection Vulnerability (Shellshock Bug)
Bash Command Injection Vulnerability (Shellshock Bug)
CAPEC-88
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Basic Authorization over HTTP
Basic Authorization over HTTP
CAPEC-65
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Basic Authorization Required
Basic Authorization Required
ISO27001-A.9.4.1
,Â
Information
BitNinja Captcha Server Identified
BitNinja Captcha Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Blind Command Injection
Blind Command Injection
CAPEC-88
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Blind Cross-site Scripting
Blind Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Blind MongoDB Injection
Blind MongoDB Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-943
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
1