🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Cost Savings Calculator
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
144
vulnerabilities categorized as medium severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Phaser Identified
Phaser Identified
Information
Phishing by Navigating Browser Tabs
Phishing by Navigating Browser Tabs
Low
Phorum Detected
Phorum Detected
Information
Phorum Detected
Phorum Detected
Information
Php Address Book Detected
Php Address Book Detected
Information
PhpFusion Detected
PhpFusion Detected
Information
PhpMyFAQ Detected
PhpMyFAQ Detected
Information
Phusion Passenger Identified
Phusion Passenger Identified
Information
Piwigo Detected
Piwigo Detected
Information
Piwik Detected
Piwik Detected
Information
PixiJs Identified
PixiJs Identified
Information
PixiJs Identified
PixiJs Identified
Information
Play Web Framework Identified
Play Web Framework Identified
Information
Plesk (Linux) Identified
Plesk (Linux) Identified
Information
Plesk (Windows) Identified
Plesk (Windows) Identified
Information
Plone CMS Identified
Plone CMS Identified
Information
Plupload Identified
Plupload Identified
Information
Plupload Identified
Plupload Identified
Information
PmWiki Detected
PmWiki Detected
Information
Podcast Generator Detected
Podcast Generator Detected
Information
Polyfill.io Supply Chain Attack
Polyfill.io Supply Chain Attack
High
Polyfill.io Supply Chain Attack
Polyfill.io Supply Chain Attack
High
Polymer Identified
Polymer Identified
Information
Polymer Identified
Polymer Identified
Information
Popper.js Identified
Popper.js Identified
Information
Popper.js Identified
Popper.js Identified
Information
Possible Boolean Mongo Db Injection
Possible Boolean Mongo Db Injection
Critical
Possible Boolean Mongo Db Injection
Possible Boolean Mongo Db Injection
Critical
PossibleBlindMongoDB
PossibleBlindMongoDB
Critical
PossibleBlindMongoDB
PossibleBlindMongoDB
Critical
PrestaShop Detected
PrestaShop Detected
Information
PrettyPhoto Identified
PrettyPhoto Identified
Information
PrettyPhoto Identified
PrettyPhoto Identified
Information
Private Burp Collaborator Server Identified
Private Burp Collaborator Server Identified
Information
Private Json Web Key Set Disclosure
Private Json Web Key Set Disclosure
Critical
Private Json Web Key Set Disclosure
Private Json Web Key Set Disclosure
Critical
Programming Error Message
Programming Error Message
Low
Programming Error Message (Ruby)
Programming Error Message (Ruby)
Low
Progress MOVEit Transfer SQL Injection
Progress MOVEit Transfer SQL Injection
High
Progress MOVEit Transfer SQL Injection
Progress MOVEit Transfer SQL Injection
High
ProjectSend Detected
ProjectSend Detected
Information
Prototype Pollution
Prototype Pollution
Low
Prototype Pollution
Prototype Pollution
Low
Prototypejs Identified
Prototypejs Identified
Information
Prototypejs Identified
Prototypejs Identified
Information
Python Identified
Python Identified
Information
Python WSGIserver Identified
Python WSGIserver Identified
Information
Question2Answer Detected
Question2Answer Detected
Information
ROBOT Attack Detected (Strong Oracle)
ROBOT Attack Detected (Strong Oracle)
High
ROBOT Attack Detected (Weak Oracle)
ROBOT Attack Detected (Weak Oracle)
High
RSA Private Key Detected
RSA Private Key Detected
Medium
Ramda Identified
Ramda Identified
Information
Ramda Identified
Ramda Identified
Information
React Identified
React Identified
Information
React Identified
React Identified
Information
Readme/Help File Detected
Readme/Help File Detected
Information
Referrer-Policy Needs Proper Fallback
Referrer-Policy Needs Proper Fallback
Information
Referrer-Policy Not Implemented
Referrer-Policy Not Implemented
Best Practice
Reflected File Download
Reflected File Download
Low
RegreSSHion Attack (CVE-2024-6387)
RegreSSHion Attack (CVE-2024-6387)
Critical
RegreSSHion Attack (CVE-2024-6387)
RegreSSHion Attack (CVE-2024-6387)
Critical
Remote Code Execution (Spring4Shell)
Remote Code Execution (Spring4Shell)
Critical
Remote Code Execution and DoS in HTTP.sys (IIS)
Remote Code Execution and DoS in HTTP.sys (IIS)
Critical
Remote File Inclusion
Remote File Inclusion
Critical
RequireJs Identified
RequireJs Identified
Information
RequireJs Identified
RequireJs Identified
Information
Resin Application Server Identified
Resin Application Server Identified
Information
Respondjs Identified
Respondjs Identified
Information
Respondjs Identified
Respondjs Identified
Information
Restlet Framework Identified
Restlet Framework Identified
Information
Retired Hash Function in SAML Response
Retired Hash Function in SAML Response
Information
Retired Hash Function in SAML Response
Retired Hash Function in SAML Response
Information
RevealJs Identified
RevealJs Identified
Information
RevealJs Identified
RevealJs Identified
Information
1