🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Invicti vs. Competitors
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
MSSP
Documentation
Vulnerability Database
Get a demo
Web Application Vulnerabilities Index
This page lists
vulnerabilities categorized as
High
severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Select Vulnerability
Vulnerability Name
Classification
Severity
Apache OFBiz Log4Shell RCE
Apache OFBiz Log4Shell RCE
CWE-CWE-78
,Â
High
Apache OFBiz SOAPService Deserialization RCE
Apache OFBiz SOAPService Deserialization RCE
CWE-CWE-502
,Â
AV:N/AC:M/Au:N/C:C/I:C/A:C
,Â
High
Apache OFBiz SSRF (CVE-2023-50968)
Apache OFBiz SSRF (CVE-2023-50968)
CWE-CWE-918
,Â
High
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
Apache OFBiz XMLRPC Deserialization RCE (CVE-2020-9496/CVE-2023-49070)
CWE-CWE-502
,Â
AV:N/AC:M/Au:N/C:N/I:P/A:N
,Â
High
Arbitrary File Creation Detected
Arbitrary File Creation Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
Arbitrary File Deletion Detected
Arbitrary File Deletion Detected
CWE-20
,Â
OWASP 2017-A5
,Â
High
ASP.NET Tracing Is Enabled
ASP.NET Tracing Is Enabled
CWE-11
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
,Â
High
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
Authentication Bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
PCI v3.2-6.5.1
,Â
CAPEC-114
,Â
115
,Â
CWE-425
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
WASC-1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
High
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
PCI v3.2-6.5.1
,Â
CAPEC-114
,Â
115
,Â
CWE-287
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.13.1.1
,Â
WASC-1
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
High
Backup Source Code Detected
Backup Source Code Detected
PCI v3.2-6.5.8
,Â
CAPEC-87
,Â
CWE-530
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
WASC-34
,Â
OWASP 2013-A7
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
High
Basic Authorization over HTTP
Basic Authorization over HTTP
PCI v3.2-6.5.4
,Â
CAPEC-65
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
High
Blind Cross-site Scripting
Blind Cross-site Scripting
PCI v3.2-6.5.7
,Â
CAPEC-19
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-8
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
Blind MongoDB Injection
Blind MongoDB Injection
PCI v3.2-6.5.1
,Â
CWE-943
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
Boolean Based MongoDB Injection
Boolean Based MongoDB Injection
PCI v3.2-6.5.1
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
High
Certificate is Signed Using a Weak Signature Algorithm
Certificate is Signed Using a Weak Signature Algorithm
PCI v3.2-6.5.4
,Â
CAPEC-459
,Â
ISO27001-A.10
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
,Â
High
Cross-site Scripting
Cross-site Scripting
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting (DOM based)
Cross-site Scripting (DOM based)
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting via File Upload
Cross-site Scripting via File Upload
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Cross-site Scripting via Remote File Inclusion
Cross-site Scripting via Remote File Inclusion
CAPEC-19
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
PCI v3.2-6.5.7
,Â
WASC-8
,Â
High
Database User Has Admin Privileges
Database User Has Admin Privileges
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
CWE-267
,Â
ISO27001-A.9.2.2
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
PCI v3.2-6.5.6
,Â
WASC-14
,Â
High
Elmah.axd / Errorlog.axd Detected
Elmah.axd / Errorlog.axd Detected
PCI v3.2-6.5.6
,Â
CAPEC-347
,Â
CWE-16
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
High
Error-Based MongoDB Injection
Error-Based MongoDB Injection
PCI v3.2-6.5.1
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
,Â
High
Expression Language Injection
Expression Language Injection
PCI v3.2-6.5.1
,Â
CWE-20
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
,Â
High
F5 Big-IP Local File Inclusion (CVE-2020-5902)
F5 Big-IP Local File Inclusion (CVE-2020-5902)
PCI v3.2-6.5.8
,Â
CAPEC-252
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-33
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
Fortigate SSL VPN Arbitrary File reading (CVE-2018-13379)
Fortigate SSL VPN Arbitrary File reading (CVE-2018-13379)
CWE-22
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
,Â
High
Grafana Open Redirect (CVE-2025-4123)
Grafana Open Redirect (CVE-2025-4123)
CWE-CWE-601
,Â
High
Insecure Transportation Security Protocol Supported (SSLv2)
Insecure Transportation Security Protocol Supported (SSLv2)
PCI v3.2-6.5.4
,Â
CAPEC-217
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
,Â
High
Insecure Transportation Security Protocol Supported (SSLv3)
Insecure Transportation Security Protocol Supported (SSLv3)
PCI v3.2-6.5.4
,Â
CAPEC-217
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
,Â
High
Insecure Transportation Security Protocol Supported (TLS 1.0)
Insecure Transportation Security Protocol Supported (TLS 1.0)
PCI v3.2-6.5.4
,Â
CAPEC-217
,Â
CWE-326
,Â
HIPAA-164.306
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
High
JBoss Web Console JMX Invoker
JBoss Web Console JMX Invoker
CWE-200
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
High
JWT Forgery via Chaining Jku Parameter with Open Redirect
JWT Forgery via Chaining Jku Parameter with Open Redirect
CWE-347
,Â
OWASP 2017-A2
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
High
JWT Forgery via Path Traversal
JWT Forgery via Path Traversal
CWE-22
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
High
JWT Forgery via SQL Injection
JWT Forgery via SQL Injection
CWE-89
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
High
JWT Forgery via unvalidated jku parameter
JWT Forgery via unvalidated jku parameter
CWE-639
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
High
JWT Signature Bypass via None Algorithm
JWT Signature Bypass via None Algorithm
CWE-287
,Â
OWASP 2017-A2
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
High
JWT Signature is not Verified
JWT Signature is not Verified
CWE-287
,Â
OWASP 2017-A2
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
,Â
High
Local File Inclusion
Local File Inclusion
PCI v3.2-6.5.8
,Â
CAPEC-252
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-33
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
Local File Inclusion (IAST)
Local File Inclusion (IAST)
PCI v3.2-6.5.8
,Â
CAPEC-252
,Â
CWE-22
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-33
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
MongoDB Operator Injection
MongoDB Operator Injection
PCI v3.2-6.5.1
,Â
CWE-943
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
High
No SAML Response Signature Check
No SAML Response Signature Check
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
High
Oracle Access Manager 'opensso' Deserialization RCE (CVE-2021-35587)
Oracle Access Manager 'opensso' Deserialization RCE (CVE-2021-35587)
CWE-CWE-502
,Â
High
Oracle WebLogic Authentication Bypass (CVE-2020-14883)
Oracle WebLogic Authentication Bypass (CVE-2020-14883)
CWE-288
,Â
OWASP 2013-A2
,Â
OWASP 2017-A2
,Â
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
,Â
High
Out of Band SAML Consumer Service XML Entity Injection
Out of Band SAML Consumer Service XML Entity Injection
PCI v3.2-6.5.1
,Â
CAPEC-376
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-43
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
,Â
High
Out of Band SAML Consumer Service XSLT Injection
Out of Band SAML Consumer Service XSLT Injection
PCI v3.2-6.5.1
,Â
CAPEC-376
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-43
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
,Â
High
Out of Band XML External Entity Injection
Out of Band XML External Entity Injection
PCI v3.2-6.5.1
,Â
CAPEC-376
,Â
CWE-611
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-43
,Â
OWASP 2013-A1
,Â
OWASP 2017-A4
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H
,Â
High
Out-of-date Version (HSQLDB)
Out-of-date Version (HSQLDB)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (Microsoft SQL Server)
Out-of-date Version (Microsoft SQL Server)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (MongoDb)
Out-of-date Version (MongoDb)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (MySQL)
Out-of-date Version (MySQL)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (Oracle)
Out-of-date Version (Oracle)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (PostgreSQL)
Out-of-date Version (PostgreSQL)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Out-of-date Version (SQLite)
Out-of-date Version (SQLite)
PCI v3.2-6.2
,Â
CAPEC-310
,Â
CWE-1035
,Â
937
,Â
HIPAA-164.308(a)(1)(i)
,Â
ISO27001-A.14.1.2
,Â
OWASP 2013-A9
,Â
OWASP 2017-A9
,Â
High
Password Transmitted over HTTP
Password Transmitted over HTTP
PCI v3.2-6.5.4
,Â
CAPEC-65
,Â
CWE-319
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
,Â
High
Polyfill.io Supply Chain Attack
Polyfill.io Supply Chain Attack
No items found.
High
Progress MOVEit Transfer SQL Injection
Progress MOVEit Transfer SQL Injection
PCI v3.2-6.5.1
,Â
CAPEC-66
,Â
CWE-89
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-19
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
High
ROBOT Attack Detected (Strong Oracle)
ROBOT Attack Detected (Strong Oracle)
PCI v3.2-6.5.4
,Â
CAPEC-217
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
High
ROBOT Attack Detected (Weak Oracle)
ROBOT Attack Detected (Weak Oracle)
PCI v3.2-6.5.4
,Â
CAPEC-217
,Â
ISO27001-A.14.1.3
,Â
WASC-4
,Â
OWASP 2013-A6
,Â
OWASP 2017-A3
,Â
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:W/RC:C
,Â
High
Ruby on Rails File Content Disclosure (CVE-2019-5418)
Ruby on Rails File Content Disclosure (CVE-2019-5418)
PCI v3.2-6.5.8
,Â
CAPEC-252
,Â
CWE-98
,Â
HIPAA-164.306(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-33
,Â
OWASP 2013-A4
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
SAML Response Signature Exclusion
SAML Response Signature Exclusion
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
High
SAML Response Without Signature
SAML Response Without Signature
CWE-16
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
,Â
High
Server-Side Request Forgery (Apache Server Status)
Server-Side Request Forgery (Apache Server Status)
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
High
Server-Side Request Forgery (AWS)
Server-Side Request Forgery (AWS)
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2017-A5
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
,Â
High
Server-Side Request Forgery (elmah)
Server-Side Request Forgery (elmah)
PCI v3.2-6.5.6
,Â
CAPEC-347
,Â
CWE-918
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
High
Server-Side Request Forgery (elmah MVC)
Server-Side Request Forgery (elmah MVC)
PCI v3.2-6.5.6
,Â
CAPEC-347
,Â
CWE-918
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
High
Server-Side Request Forgery (MySQL)
Server-Side Request Forgery (MySQL)
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
High
Server-Side Request Forgery (SSH)
Server-Side Request Forgery (SSH)
CWE-918
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
,Â
High
Server-Side Template Injection (IAST)
Server-Side Template Injection (IAST)
PCI v3.2-6.5.1
,Â
CAPEC-66
,Â
CWE-20
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-19
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
,Â
High
SimpleHelp Path Traversal (CVE-2024-57727)
SimpleHelp Path Traversal (CVE-2024-57727)
CWE-CWE-22
,Â
High
Sitecore Arbitrary File Read (CVE-2024-46938)
Sitecore Arbitrary File Read (CVE-2024-46938)
CWE-CWE-200
,Â
High
Stored Cross-site Scripting
Stored Cross-site Scripting
PCI v3.2-6.5.7
,Â
CAPEC-19
,Â
CWE-79
,Â
HIPAA-164.308(a)
,Â
ISO27001-A.14.2.5
,Â
WASC-8
,Â
OWASP 2013-A3
,Â
OWASP 2017-A7
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
,Â
High
SVN Detected
SVN Detected
CAPEC-118
,Â
CWE-527
,Â
ISO27001-A.9.4.1
,Â
WASC-13
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
,Â
High
TorchServe Management API Publicly Exposed
TorchServe Management API Publicly Exposed
PCI v3.2-6.5.8
,Â
CAPEC-212
,Â
CWE-200
,Â
HIPAA-164.312(a)(1)
,Â
ISO27001-A.18.1.3
,Â
WASC-14
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
High
Trace.axd Detected
Trace.axd Detected
PCI v3.2-6.5.6
,Â
CAPEC-347
,Â
CWE-16
,Â
HIPAA-164.306(a)
,Â
164.308(a)
,Â
ISO27001-A.18.1.3
,Â
WASC-15
,Â
OWASP 2013-A5
,Â
OWASP 2017-A6
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
,Â
High
Unrestricted File Upload
Unrestricted File Upload
PCI v3.2-6.5.1
,Â
CWE-434
,Â
ISO27001-A.14.2.5
,Â
OWASP 2013-A1
,Â
OWASP 2017-A1
,Â
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
,Â
High
1