🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
vulnerabilities categorized as
High
severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Apache OFBiz Log4Shell RCE
Apache OFBiz Log4Shell RCE
CWE-CWE-78
,Â
High
Apache OFBiz SOAPService Deserialization RCE
Apache OFBiz SOAPService Deserialization RCE
AV:N/AC:M/Au:N/C:C/I:C/A:C
,Â
CWE-CWE-502
,Â
High
Apache OFBiz SSRF (CVE-2023-50968)
Apache OFBiz SSRF (CVE-2023-50968)
CWE-CWE-918
,Â
High
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
AV:N/AC:M/Au:N/C:N/I:P/A:N
,Â
CWE-CWE-502
,Â
High
Arbitrary File Creation Detected
Arbitrary File Creation Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
Arbitrary File Deletion Detected
Arbitrary File Deletion Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
ASP.NET Tracing Is Enabled
ASP.NET Tracing Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
,Â
CWE-11
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
CAPEC-114
,Â
115
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-425
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-1
,Â
High
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
CAPEC-114
,Â
115
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-287
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
WASC-1
,Â
High
Backup Source Code Detected
Backup Source Code Detected
CAPEC-87
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-530
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-34
,Â
High
Basic Authorization over HTTP
Basic Authorization over HTTP
CAPEC-65
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Blind Cross-site Scripting
Blind Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Blind MongoDB Injection
Blind MongoDB Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-943
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
Boolean Based MongoDB Injection
Boolean Based MongoDB Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
Certificate is Signed Using a Weak Signature Algorithm
Certificate is Signed Using a Weak Signature Algorithm
CAPEC-459
,Â
ISO27001-A.10
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Cross-site Scripting
Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting (DOM based)
Cross-site Scripting (DOM based)
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting via File Upload
Cross-site Scripting via File Upload
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting via Remote File Inclusion
Cross-site Scripting via Remote File Inclusion
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Database User Has Admin Privileges
Database User Has Admin Privileges
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-267
,Â
ISO27001-A.9.2.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-14
,Â
High
Elmah.axd / Errorlog.axd Detected
Elmah.axd / Errorlog.axd Detected
CAPEC-347
,Â
CWE-16
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-15
,Â
High
Error-Based MongoDB Injection
Error-Based MongoDB Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
Expression Language Injection
Expression Language Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-20
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
F5 Big-IP Local File Inclusion (CVE-2020-5902)
F5 Big-IP Local File Inclusion (CVE-2020-5902)
CAPEC-252
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-33
,Â
High
Fortigate SSL VPN Arbitrary File reading (CVE-2018-13379)
Fortigate SSL VPN Arbitrary File reading (CVE-2018-13379)
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-22
,Â
High
Grafana Open Redirect (CVE-2025-4123)
Grafana Open Redirect (CVE-2025-4123)
CWE-CWE-601
,Â
High
Insecure Transportation Security Protocol Supported (SSLv2)
Insecure Transportation Security Protocol Supported (SSLv2)
CAPEC-217
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Insecure Transportation Security Protocol Supported (SSLv3)
Insecure Transportation Security Protocol Supported (SSLv3)
CAPEC-217
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Insecure Transportation Security Protocol Supported (TLS 1.0)
Insecure Transportation Security Protocol Supported (TLS 1.0)
CAPEC-217
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
JBoss Web Console JMX Invoker
JBoss Web Console JMX Invoker
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
CWE-200
,Â
High
JWT Forgery via Chaining Jku Parameter with Open Redirect
JWT Forgery via Chaining Jku Parameter with Open Redirect
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
CWE-347
,Â
OWASP 2017-A2
,Â
High
JWT Forgery via Path Traversal
JWT Forgery via Path Traversal
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
CWE-22
,Â
OWASP 2017-A1
,Â
High
JWT Forgery via SQL Injection
JWT Forgery via SQL Injection
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-89
,Â
OWASP 2017-A1
,Â
High
JWT Forgery via unvalidated jku parameter
JWT Forgery via unvalidated jku parameter
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
CWE-639
,Â
OWASP 2017-A1
,Â
High
JWT Signature Bypass via None Algorithm
JWT Signature Bypass via None Algorithm
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
CWE-287
,Â
OWASP 2017-A2
,Â
High
JWT Signature is not Verified
JWT Signature is not Verified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
CWE-287
,Â
OWASP 2017-A2
,Â
High
Local File Inclusion
Local File Inclusion
CAPEC-252
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-33
,Â
High
Local File Inclusion (IAST)
Local File Inclusion (IAST)
CAPEC-252
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-33
,Â
High
MongoDB Operator Injection
MongoDB Operator Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
No SAML Response Signature Check
No SAML Response Signature Check
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
High
Oracle Access Manager 'opensso' Deserialization RCE (CVE-2021-35587)
Oracle Access Manager 'opensso' Deserialization RCE (CVE-2021-35587)
CWE-CWE-502
,Â
High
Oracle WebLogic Authentication Bypass (CVE-2020-14883)
Oracle WebLogic Authentication Bypass (CVE-2020-14883)
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-288
,Â
OWASP 2013-A2
,Â
OWASP 2017-A2
,Â
High
Out of Band SAML Consumer Service XML Entity Injection
Out of Band SAML Consumer Service XML Entity Injection
CAPEC-376
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
PCI v3.2-6.5.1
,Â
WASC-43
,Â
High
Out of Band SAML Consumer Service XSLT Injection
Out of Band SAML Consumer Service XSLT Injection
CAPEC-376
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
PCI v3.2-6.5.1
,Â
WASC-43
,Â
High
Out of Band XML External Entity Injection
Out of Band XML External Entity Injection
CAPEC-376
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
PCI v3.2-6.5.1
,Â
WASC-43
,Â
High
Out-of-date Version (HSQLDB)
Out-of-date Version (HSQLDB)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (Microsoft SQL Server)
Out-of-date Version (Microsoft SQL Server)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (MongoDb)
Out-of-date Version (MongoDb)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (MySQL)
Out-of-date Version (MySQL)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (Oracle)
Out-of-date Version (Oracle)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (PostgreSQL)
Out-of-date Version (PostgreSQL)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Out-of-date Version (SQLite)
Out-of-date Version (SQLite)
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.2
,Â
High
Password Transmitted over HTTP
Password Transmitted over HTTP
CAPEC-65
,Â
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Polyfill.io Supply Chain Attack
Polyfill.io Supply Chain Attack
No items found.
High
ROBOT Attack Detected (Strong Oracle)
ROBOT Attack Detected (Strong Oracle)
CAPEC-217
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
ROBOT Attack Detected (Weak Oracle)
ROBOT Attack Detected (Weak Oracle)
CAPEC-217
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Ruby on Rails File Content Disclosure (CVE-2019-5418)
Ruby on Rails File Content Disclosure (CVE-2019-5418)
CAPEC-252
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-98
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-33
,Â
High
SAML Response Signature Exclusion
SAML Response Signature Exclusion
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
High
SAML Response Without Signature
SAML Response Without Signature
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
High
Server-Side Request Forgery (Apache Server Status)
Server-Side Request Forgery (Apache Server Status)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
Server-Side Request Forgery (AWS)
Server-Side Request Forgery (AWS)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A5
,Â
High
Server-Side Request Forgery (elmah)
Server-Side Request Forgery (elmah)
CAPEC-347
,Â
CWE-918
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-15
,Â
High
Server-Side Request Forgery (elmah MVC)
Server-Side Request Forgery (elmah MVC)
CAPEC-347
,Â
CWE-918
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-15
,Â
High
Server-Side Request Forgery (MySQL)
Server-Side Request Forgery (MySQL)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
Server-Side Request Forgery (SSH)
Server-Side Request Forgery (SSH)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
Server-Side Template Injection (IAST)
Server-Side Template Injection (IAST)
CAPEC-66
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-20
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-19
,Â
High
SimpleHelp Path Traversal (CVE-2024-57727)
SimpleHelp Path Traversal (CVE-2024-57727)
CWE-CWE-22
,Â
High
Sitecore Arbitrary File Read (CVE-2024-46938)
Sitecore Arbitrary File Read (CVE-2024-46938)
CWE-CWE-200
,Â
High
Stored Cross-site Scripting
Stored Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
SVN Detected
SVN Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-527
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
High
TorchServe Management API Publicly Exposed
TorchServe Management API Publicly Exposed
CAPEC-212
,Â
CWE-200
,Â
HIPAA-164.312(a)(1)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.8
,Â
WASC-14
,Â
High
Trace.axd Detected
Trace.axd Detected
CAPEC-347
,Â
CWE-16
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-15
,Â
High
Unrestricted File Upload
Unrestricted File Upload
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
,Â
CWE-434
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
High
Vite Arbitrary File Read (CVE-2025-30208, CVE-2025-31125)
Vite Arbitrary File Read (CVE-2025-30208, CVE-2025-31125)
CWE-CWE-200
,Â
High
1