🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
vulnerabilities categorized as
Medium
severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Active Mixed Content over HTTPS
Active Mixed Content over HTTPS
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
Anonymous Ciphers Supported
Anonymous Ciphers Supported
CAPEC-117
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
,Â
CWE-311
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
Medium
Apache Server-Info Detected
Apache Server-Info Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Apache Server-Status Detected
Apache Server-Status Detected
CAPEC-347
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
ASP.NET Cookieless Authentication Is Enabled
ASP.NET Cookieless Authentication Is Enabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET Cookieless Session State Is Enabled
ASP.NET Cookieless Session State Is Enabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET CustomErrors Is Disabled
ASP.NET CustomErrors Is Disabled
CWE-16
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
ASP.NET: Failure To Require SSL For Authentication Cookies
ASP.NET: Failure To Require SSL For Authentication Cookies
CWE-16
,Â
OWASP 2017-A6
,Â
Medium
ASP.NET Login Credentials Stored In Plain Text
ASP.NET Login Credentials Stored In Plain Text
CWE-312
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Medium
ASP.NET ValidateRequest Is Globally Disabled
ASP.NET ValidateRequest Is Globally Disabled
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Axis Development Mode Enabled in WEB-INF/server-config.wsdd
Axis Development Mode Enabled in WEB-INF/server-config.wsdd
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Axis system configuration listing enabled in WEB-INF/server-config.wsdd
Axis system configuration listing enabled in WEB-INF/server-config.wsdd
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Base Tag Hijacking
Base Tag Hijacking
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
,Â
CWE-20
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
Medium
B.R.E.A.C.H. Attack Detected
B.R.E.A.C.H. Attack Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
CWE-310
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
Medium
BREACH Attack Detected
BREACH Attack Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
CWE-310
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
Medium
Critical Form Send to HTTP
Critical Form Send to HTTP
CAPEC-65
,Â
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
Medium
Critical Form Served over HTTP
Critical Form Served over HTTP
CAPEC-65
,Â
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
Medium
Custom Error Pages Are Not Configured in WEB-INF/web.xml
Custom Error Pages Are Not Configured in WEB-INF/web.xml
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
CVS Detected
CVS Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-527
,Â
ISO27001-A.9.4.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Medium
Expired SSL Certificate
Expired SSL Certificate
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
,Â
CWE-295
,Â
OWASP 2017-A3
,Â
Medium
Express Development Mode Is Enabled
Express Development Mode Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Express express-session Weak Secret Key Detected
Express express-session Weak Secret Key Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-200
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Frame Injection
Frame Injection
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
,Â
CWE-601
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-38
,Â
Medium
GIT Detected
GIT Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-527
,Â
ISO27001-A.9.4.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Medium
GraphiQL Explorer/Playground Enabled
GraphiQL Explorer/Playground Enabled
AV:N/AC:L/Au:N/C:P/I:N/A:N
,Â
CWE-CWE-200
,Â
Medium
GraphQL Alias Overloading Allowed: Potential Denial of Service Vulnerability
GraphQL Alias Overloading Allowed: Potential Denial of Service Vulnerability
AV:N/AC:L/Au:N/C:N/I:N/A:P
,Â
CWE-CWE-400
,Â
Medium
GraphQL Array-based Query Batching Allowed: Potential Batching Attack Vulnerability
GraphQL Array-based Query Batching Allowed: Potential Batching Attack Vulnerability
AV:N/AC:L/Au:N/C:P/I:P/A:P
,Â
CWE-CWE-770
,Â
Medium
GraphQL Circular-Query via Introspection Allowed: Potential DoS Vulnerability
GraphQL Circular-Query via Introspection Allowed: Potential DoS Vulnerability
AV:N/AC:L/Au:N/C:N/I:N/A:P
,Â
CWE-CWE-400
,Â
Medium
GraphQL Field Suggestions Enabled
GraphQL Field Suggestions Enabled
AV:N/AC:L/Au:N/C:P/I:N/A:N
,Â
CWE-CWE-200
,Â
Medium
GraphQL Introspection Query Enabled
GraphQL Introspection Query Enabled
AV:N/AC:L/Au:N/C:P/I:N/A:N
,Â
CWE-CWE-200
,Â
Medium
GraphQL Non-JSON Mutations over GET: Potential CSRF Vulnerability
GraphQL Non-JSON Mutations over GET: Potential CSRF Vulnerability
AV:N/AC:M/Au:N/C:P/I:P/A:N
,Â
CWE-CWE-352
,Â
Medium
GraphQL Non-JSON Queries over GET: Potential CSRF Vulnerability
GraphQL Non-JSON Queries over GET: Potential CSRF Vulnerability
AV:N/AC:M/Au:N/C:P/I:P/A:N
,Â
CWE-CWE-352
,Â
Medium
GraphQL Non-JSON Queries over POST: Potential CSRF Vulnerability
GraphQL Non-JSON Queries over POST: Potential CSRF Vulnerability
AV:N/AC:M/Au:N/C:P/I:P/A:N
,Â
CWE-CWE-352
,Â
Medium
GraphQL Unauthenticated Mutation Detected
GraphQL Unauthenticated Mutation Detected
AV:N/AC:L/Au:N/C:P/I:N/A:N
,Â
CWE-CWE-306
,Â
Medium
GraphQL Unhandled Error Leakage
GraphQL Unhandled Error Leakage
AV:N/AC:L/Au:N/C:P/I:N/A:N
,Â
CWE-CWE-209
,Â
Medium
HTTP Header Injection
HTTP Header Injection
CAPEC-105
,Â
CWE-93
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-24
,Â
Medium
HTTP Header Injection (IAST)
HTTP Header Injection (IAST)
CAPEC-105
,Â
CWE-93
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-24
,Â
Medium
HTTP Strict Transport Security (HSTS) Errors and Warnings
HTTP Strict Transport Security (HSTS) Errors and Warnings
CWE-16
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Medium
HTTP Strict Transport Security (HSTS) Policy Not Enabled
HTTP Strict Transport Security (HSTS) Policy Not Enabled
CAPEC-217
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
,Â
CWE-523
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
WASC-4
,Â
Medium
Insecure HTTP Usage
Insecure HTTP Usage
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A3
,Â
WASC-4
,Â
Medium
Invalid SSL Certificate
Invalid SSL Certificate
CAPEC-459
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
,Â
CWE-295
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
Medium
JavaMelody Interface Detected
JavaMelody Interface Detected
CAPEC-347
,Â
CWE-16
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Java Verb Tampering Via Misconfigured Security Constraint
Java Verb Tampering Via Misconfigured Security Constraint
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
JetBrains .idea Project Directory Detected
JetBrains .idea Project Directory Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-285
,Â
ISO27001-A9.4.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Medium
Microsoft Access Database File Detected
Microsoft Access Database File Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
CWE-285
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A7
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.8
,Â
WASC-2
,Â
Medium
Node.js Web Application does not handle uncaughtException
Node.js Web Application does not handle uncaughtException
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-248
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Node.js Web Application does not handle unhandledRejection
Node.js Web Application does not handle unhandledRejection
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-248
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-14
,Â
Medium
Open Policy Crossdomain.xml Detected
Open Policy Crossdomain.xml Detected
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Medium
Open Redirection
Open Redirection
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
CWE-601
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A10
,Â
WASC-38
,Â
Medium
Open Redirection (DOM based)
Open Redirection (DOM based)
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
,Â
CWE-601
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A10
,Â
WASC-38
,Â
Medium
Open Silverlight Client Access Policy
Open Silverlight Client Access Policy
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Medium
Overly Long Session Timeout
Overly Long Session Timeout
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
PAN-OS GlobalProtect XSS (CVE-2025-0133)
PAN-OS GlobalProtect XSS (CVE-2025-0133)
CWE-CWE-79
,Â
Medium
Password Transmitted over Query String
Password Transmitted over Query String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
CWE-598
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-13
,Â
Medium
PHP enable_dl Is Enabled
PHP enable_dl Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
,Â
CWE-16
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
PHP register_globals Is Enabled
PHP register_globals Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
,Â
CWE-473
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
PHP session.use_only_cookies Is Disabled
PHP session.use_only_cookies Is Disabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
,Â
CWE-598
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
PHP session.use_trans_sid Is Enabled
PHP session.use_trans_sid Is Enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
,Â
CWE-598
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
Medium
Revoked SSL Certificate
Revoked SSL Certificate
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
,Â
CWE-295
,Â
OWASP 2017-A3
,Â
Medium
RSA Private Key Detected
RSA Private Key Detected
CAPEC-118
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
WASC-13
,Â
Medium
SAML Consumer Service KeyInfo RetrievalMethod SSRF
SAML Consumer Service KeyInfo RetrievalMethod SSRF
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
WASC-20
,Â
Medium
SAML Consumer Service XSS Vulnerability
SAML Consumer Service XSS Vulnerability
CAPEC-19
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
Medium
Sensitive Data Exposure
Sensitive Data Exposure
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon AWS Access Key Id
Sensitive Data Exposure - Amazon AWS Access Key Id
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon AWS Secret Key
Sensitive Data Exposure - Amazon AWS Secret Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon MWS Auth Token
Sensitive Data Exposure - Amazon MWS Auth Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon SES SMTP Password
Sensitive Data Exposure - Amazon SES SMTP Password
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Consul Token
Sensitive Data Exposure - Consul Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Database Connection String - MongoDB - MySQL
Sensitive Data Exposure - Database Connection String - MongoDB - MySQL
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Database Connection String - PostgreSQL
Sensitive Data Exposure - Database Connection String - PostgreSQL
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Devise Secret Key
Sensitive Data Exposure - Devise Secret Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook Access Token
Sensitive Data Exposure - Facebook Access Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook App ID
Sensitive Data Exposure - Facebook App ID
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook App Secret
Sensitive Data Exposure - Facebook App Secret
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
1