🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Invicti vs. Competitors
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
MSSP
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
144
vulnerabilities categorized as medium severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Question2Answer Detected
Question2Answer Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
Information
Ramda Identified
Ramda Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
React Identified
React Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Readme/Help File Detected
Readme/Help File Detected
CAPEC-87
,Â
CWE-425
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-34
,Â
Information
Referrer-Policy Needs Proper Fallback
Referrer-Policy Needs Proper Fallback
CWE-200
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A6
,Â
OWASP 2017-A6
,Â
Information
Referrer-Policy Not Implemented
Referrer-Policy Not Implemented
CWE-200
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
Best Practice
Reflected File Download
Reflected File Download
CAPEC-375
,Â
CWE-840
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-42
,Â
Low
RegreSSHion Attack (CVE-2024-6387)
RegreSSHion Attack (CVE-2024-6387)
CAPEC-26
,Â
CWE-366
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
PCI v3.2-6.5.1
,Â
Critical
Remote Code Execution and DoS in HTTP.sys (IIS)
Remote Code Execution and DoS in HTTP.sys (IIS)
CAPEC-340
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:W/RC:C
,Â
CWE-20
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-7
,Â
Critical
Remote Code Execution (Spring4Shell)
Remote Code Execution (Spring4Shell)
CAPEC-242
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
,Â
CWE-94
,Â
HIPAA-164.306(a)
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
Critical
Remote File Inclusion
Remote File Inclusion
CAPEC-193
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
,Â
CWE-98
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
PCI v3.2-6.5.1
,Â
WASC-5
,Â
Critical
RequireJs Identified
RequireJs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Resin Application Server Identified
Resin Application Server Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Respondjs Identified
Respondjs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Restlet Framework Identified
Restlet Framework Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Retired Hash Function in SAML Response
Retired Hash Function in SAML Response
CWE-16
,Â
Information
RevealJs Identified
RevealJs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Reverse Proxy Detected (Apache Traffic Server)
Reverse Proxy Detected (Apache Traffic Server)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Reverse Proxy Detected (Citrix Netscaler)
Reverse Proxy Detected (Citrix Netscaler)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Reverse Proxy Detected (Envoy)
Reverse Proxy Detected (Envoy)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Reverse Proxy Detected (F5 BIG-IP)
Reverse Proxy Detected (F5 BIG-IP)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Reverse Proxy Detected (HAProxy)
Reverse Proxy Detected (HAProxy)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Reverse Proxy Detected (Skipper)
Reverse Proxy Detected (Skipper)
CAPEC-224
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
WASC-45
,Â
Information
Revive Adserver Detected
Revive Adserver Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Revoked SSL Certificate
Revoked SSL Certificate
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
,Â
CWE-295
,Â
OWASP 2017-A3
,Â
Medium
Rickshaw Identified
Rickshaw Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
RiotJs Identified
RiotJs Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
ROBOT Attack Detected (Strong Oracle)
ROBOT Attack Detected (Strong Oracle)
CAPEC-217
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
ROBOT Attack Detected (Weak Oracle)
ROBOT Attack Detected (Weak Oracle)
CAPEC-217
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
ISO27001-A.14.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.4
,Â
WASC-4
,Â
High
Robots.txt Detected
Robots.txt Detected
ISO27001-A.18.1.3
,Â
Information
RoR Database Configuration File Detected
RoR Database Configuration File Detected
CWE-285
,Â
ISO27001-A.9.4.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
Low
RoR Development Mode Enabled
RoR Development Mode Enabled
CAPEC-214
,Â
CWE-16
,Â
ISO27001-A.14.1.1
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.5
,Â
WASC-14
,Â
Low
Roundcube Detected
Roundcube Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
RSA Private Key Detected
RSA Private Key Detected
CAPEC-118
,Â
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.18.1.3
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
WASC-13
,Â
Medium
RubyGems Identified
RubyGems Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Ruby on Rails File Content Disclosure (CVE-2019-5418)
Ruby on Rails File Content Disclosure (CVE-2019-5418)
CAPEC-252
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-98
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
PCI v3.2-6.5.8
,Â
WASC-33
,Â
High
Ruby on Rails Identified
Ruby on Rails Identified
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
,Â
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Rukovoditel Detected
Rukovoditel Detected
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
Information
SailsJS Identified
SailsJS Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
SameSite Cookie Not Implemented
SameSite Cookie Not Implemented
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
Best Practice
SameSite None Cookie Not Marked as Secure
SameSite None Cookie Not Marked as Secure
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
Best Practice
SAML Consumer Service KeyInfo RetrievalMethod SSRF
SAML Consumer Service KeyInfo RetrievalMethod SSRF
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
WASC-20
,Â
Medium
SAML Consumer Service XSS Vulnerability
SAML Consumer Service XSS Vulnerability
CAPEC-19
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
Medium
SAML Response Signature Exclusion
SAML Response Signature Exclusion
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
High
SAML Response Without Signature
SAML Response Without Signature
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
CWE-16
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
WASC-15
,Â
High
Scheme URI Detected in Content Security Policy (CSP) Directive
Scheme URI Detected in Content Security Policy (CSP) Directive
ISO27001-A.14.2.5
,Â
Information
ScrollReveal Identified
ScrollReveal Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Security.txt Detected
Security.txt Detected
ISO27001-A.18.1.3
,Â
Information
Select2 Identified
Select2 Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
SemanticUI Identified
SemanticUI Identified
CWE-205
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A6
,Â
WASC-13
,Â
Information
Sensitive Data Exposure
Sensitive Data Exposure
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon AWS Access Key Id
Sensitive Data Exposure - Amazon AWS Access Key Id
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon AWS Secret Key
Sensitive Data Exposure - Amazon AWS Secret Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon MWS Auth Token
Sensitive Data Exposure - Amazon MWS Auth Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Amazon SES SMTP Password
Sensitive Data Exposure - Amazon SES SMTP Password
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Consul Token
Sensitive Data Exposure - Consul Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Database Connection String - MongoDB - MySQL
Sensitive Data Exposure - Database Connection String - MongoDB - MySQL
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Database Connection String - PostgreSQL
Sensitive Data Exposure - Database Connection String - PostgreSQL
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Devise Secret Key
Sensitive Data Exposure - Devise Secret Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook Access Token
Sensitive Data Exposure - Facebook Access Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook App ID
Sensitive Data Exposure - Facebook App ID
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Facebook App Secret
Sensitive Data Exposure - Facebook App Secret
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Gitlab Personal Access Token
Sensitive Data Exposure - Gitlab Personal Access Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Google Cloud API Key
Sensitive Data Exposure - Google Cloud API Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Google OAuth Access Token
Sensitive Data Exposure - Google OAuth Access Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Heroku API Key
Sensitive Data Exposure - Heroku API Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - JDBC Database Connection String
Sensitive Data Exposure - JDBC Database Connection String
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Jenkins Secret
Sensitive Data Exposure - Jenkins Secret
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - LinkedIn API Key
Sensitive Data Exposure - LinkedIn API Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - MailChimp API Key
Sensitive Data Exposure - MailChimp API Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - MailGun API Key
Sensitive Data Exposure - MailGun API Key
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Mapbox Token
Sensitive Data Exposure - Mapbox Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - Nexmo Secret
Sensitive Data Exposure - Nexmo Secret
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
Sensitive Data Exposure - NPM Access Token
Sensitive Data Exposure - NPM Access Token
CAPEC-37
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
,Â
CWE-200
,Â
ISO27001-A.8.2.1
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
PCI v3.2-6.5.6
,Â
WASC-WASC-13
,Â
Medium
1