🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
vulnerabilities categorized as
Critical
severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
ActiveMQ - Remote Code Execution (CVE-2023-46604)
ActiveMQ - Remote Code Execution (CVE-2023-46604)
CAPEC-242
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Apache OFBiz Authentication Bypass (CVE-2023-51467)
Apache OFBiz Authentication Bypass (CVE-2023-51467)
CWE-CWE-287
,Â
Critical
Apache OFBiz RCE (CVE-2024-32113/CVE-2024-36104/CVE-2024-38856)
Apache OFBiz RCE (CVE-2024-32113/CVE-2024-36104/CVE-2024-38856)
CWE-CWE-22
,Â
Critical
Apache OFBiz RCE (CVE-2024-45195)
Apache OFBiz RCE (CVE-2024-45195)
CWE-CWE-425
,Â
Critical
Apache OFBiz SSRF (CVE-2024-45507)
Apache OFBiz SSRF (CVE-2024-45507)
CWE-CWE-918
,Â
Critical
Apache Struts Path traversal (S2-067/CVE-2024-53677, S2-066/CVE-2023-50164)
Apache Struts Path traversal (S2-067/CVE-2024-53677, S2-066/CVE-2023-50164)
CWE-CWE-434
,Â
Critical
Bash Command Injection Vulnerability (Shellshock Bug)
Bash Command Injection Vulnerability (Shellshock Bug)
CAPEC-88
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Blind Command Injection
Blind Command Injection
CAPEC-88
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Blind SQL Injection
Blind SQL Injection
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Boolean Based SQL Injection
Boolean Based SQL Injection
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Citrix NetScaler Memory Disclosure 'Citrix Bleed 2' (CVE-2025-5777)
Citrix NetScaler Memory Disclosure 'Citrix Bleed 2' (CVE-2025-5777)
CWE-CWE-457
,Â
Critical
Code Evaluation (Apache Struts)
Code Evaluation (Apache Struts)
CAPEC-23
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts S02-53)
Code Evaluation (Apache Struts S02-53)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-016
Code Evaluation (Apache Struts) S2-016
CAPEC-23
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-045
Code Evaluation (Apache Struts) S2-045
CAPEC-23
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Apache Struts) S2-046
Code Evaluation (Apache Struts) S2-046
CAPEC-23
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (ASP)
Code Evaluation (ASP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Node.js)
Code Evaluation (Node.js)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Perl)
Code Evaluation (Perl)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (PHP)
Code Evaluation (PHP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (PHP) - IAST
Code Evaluation (PHP) - IAST
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (Python)
Code Evaluation (Python)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation (RoR)
Code Evaluation (RoR)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Code Evaluation (RoR - JSON)
Code Evaluation (RoR - JSON)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Code Evaluation (Ruby)
Code Evaluation (Ruby)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Evaluation via Local File Inclusion (PHP)
Code Evaluation via Local File Inclusion (PHP)
CAPEC-251
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-33
,Â
Critical
Code Execution via File Upload
Code Execution via File Upload
CAPEC-210
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-42
,Â
Critical
Code Execution via Local File Inclusion
Code Execution via Local File Inclusion
CAPEC-170
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-33
,Â
Critical
Code Execution via SSTI
Code Execution via SSTI
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (ASP.NET Razor)
Code Execution via SSTI (ASP.NET Razor)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Java FreeMarker)
Code Execution via SSTI (Java FreeMarker)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Java Pebble)
Code Execution via SSTI (Java Pebble)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Java Velocity)
Code Execution via SSTI (Java Velocity)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (JinJava)
Code Execution via SSTI (JinJava)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Node.js Dot)
Code Execution via SSTI (Node.js Dot)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Node.js EJS)
Code Execution via SSTI (Node.js EJS)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Node.js Marko)
Code Execution via SSTI (Node.js Marko)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Node.js Nunjucks)
Code Execution via SSTI (Node.js Nunjucks)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Node.js Pug (Jade))
Code Execution via SSTI (Node.js Pug (Jade))
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (PHP Smarty)
Code Execution via SSTI (PHP Smarty)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (PHP Twig)
Code Execution via SSTI (PHP Twig)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Python Jinja)
Code Execution via SSTI (Python Jinja)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Python Mako)
Code Execution via SSTI (Python Mako)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Python Tornado)
Code Execution via SSTI (Python Tornado)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Ruby ERB)
Code Execution via SSTI (Ruby ERB)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via SSTI (Ruby Slim)
Code Execution via SSTI (Ruby Slim)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Code Execution via WebDAV
Code Execution via WebDAV
CAPEC-17
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.8
,Â
WASC-17
,Â
Critical
Command Injection
Command Injection
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Command Injection (IAST)
Command Injection (IAST)
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
CVE-2024-6297 WordPress Plugin Backdoor
CVE-2024-6297 WordPress Plugin Backdoor
CAPEC-443
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-507
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.12.2.1
,Â
OWASP 2017-A10
,Â
PCI v3.2-6.5.6
,Â
Critical
CyberPanel RCE (CVE-2024-51567/CVE-2024-51568/CVE-2024-51378)
CyberPanel RCE (CVE-2024-51567/CVE-2024-51568/CVE-2024-51378)
CWE-CWE-306
,Â
Critical
Drupal Core - Remote Code Execution (CVE-2019-6340)
Drupal Core - Remote Code Execution (CVE-2019-6340)
CAPEC-242
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Ivanti ICS and IPS Command Injection - CVE-2024-2188
Ivanti ICS and IPS Command Injection - CVE-2024-2188
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
Ivanti ICS and IPS Command Injection - CVE-2024-21887
Ivanti ICS and IPS Command Injection - CVE-2024-21887
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-78
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
JWT kid Parameter Out of Band Command Injection
JWT kid Parameter Out of Band Command Injection
CAPEC-88
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-78
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-31
,Â
Critical
LDAP Injection (IAST)
LDAP Injection (IAST)
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Mail Header Injection (IAST)
Mail Header Injection (IAST)
CAPEC-66
,Â
CWE-20
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
Malware Identified
Malware Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-506
,Â
Critical
MongoDB Injection (IAST)
MongoDB Injection (IAST)
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
Critical
OpenSSL Heartbleed
OpenSSL Heartbleed
CAPEC-216
,Â
CWE-119
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A6
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.2
,Â
Critical
Oracle EBS - Unauthenticated Remote Code Execution
Oracle EBS - Unauthenticated Remote Code Execution
CAPEC-210
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
ISO27001-A14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-42
,Â
Critical
Oracle WebLogic Remote Code Execution (CVE-2020-14882)
Oracle WebLogic Remote Code Execution (CVE-2020-14882)
CAPEC-242
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Apache Struts 2)
Out of Band Code Evaluation (Apache Struts 2)
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Apache Struts 2) S2-053
Out of Band Code Evaluation (Apache Struts 2) S2-053
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (ASP)
Out of Band Code Evaluation (ASP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Log4j)
Out of Band Code Evaluation (Log4j)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-502
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Node.js)
Out of Band Code Evaluation (Node.js)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Perl)
Out of Band Code Evaluation (Perl)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (PHP)
Out of Band Code Evaluation (PHP)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (Python)
Out of Band Code Evaluation (Python)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Evaluation (RoR)
Out of Band Code Evaluation (RoR)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/RL:O
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Out of Band Code Evaluation (RoR - JSON)
Out of Band Code Evaluation (RoR - JSON)
CAPEC-356
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-23
,Â
Critical
Out of Band Code Evaluation (Ruby)
Out of Band Code Evaluation (Ruby)
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Out of Band Code Execution via SSTI
Out of Band Code Execution via SSTI
CAPEC-23
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
1