🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Cost Savings Calc
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
144
vulnerabilities categorized as medium severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
Internal IP Address Disclosure
Internal IP Address Disclosure
Low
Internal Path Disclosure (*nix)
Internal Path Disclosure (*nix)
Information
Internal Path Disclosure (Windows)
Internal Path Disclosure (Windows)
Information
Internal Server Error
Internal Server Error
Low
Introjs Identified
Introjs Identified
Information
Invalid Content Security Policy (CSP) Directive Identified in meta Elements
Invalid Content Security Policy (CSP) Directive Identified in meta Elements
Information
Invalid SSL Certificate
Invalid SSL Certificate
Medium
IonRangeSlider Identified
IonRangeSlider Identified
Information
Ivanti ICS and IPS Command Injection - CVE-2024-2188
Ivanti ICS and IPS Command Injection - CVE-2024-2188
Critical
Ivanti ICS and IPS Command Injection - CVE-2024-21887
Ivanti ICS and IPS Command Injection - CVE-2024-21887
Critical
Java Identified
Java Identified
Information
JavaMelody Interface Detected
JavaMelody Interface Detected
Medium
JavaScriptCookie Identified
JavaScriptCookie Identified
Information
Java Servlet Identified
Java Servlet Identified
Information
Java Verb Tampering Via Misconfigured Security Constraint
Java Verb Tampering Via Misconfigured Security Constraint
Medium
JBoss Application Server Identified
JBoss Application Server Identified
Information
JBoss Core Services Identified
JBoss Core Services Identified
Information
JBoss Enterprise Application Platform Identified
JBoss Enterprise Application Platform Identified
Information
JBoss Web Console JMX Invoker
JBoss Web Console JMX Invoker
High
Jenkins Identified
Jenkins Identified
Information
JetBrains .idea Project Directory Detected
JetBrains .idea Project Directory Detected
Medium
Jetty Web Server Identified
Jetty Web Server Identified
Information
Jolokia Identified
Jolokia Identified
Information
Joomla Detected
Joomla Detected
Information
jPlayer Identified
jPlayer Identified
Information
jQuery Identified
jQuery Identified
Information
JqueryMask Identified
JqueryMask Identified
Information
jQueryMigrate Identified
jQueryMigrate Identified
Information
jQueryMobile Identified
jQueryMobile Identified
Information
JQuery placeholder.js Identified
JQuery placeholder.js Identified
Information
jQueryUiAutocomplete Identified
jQueryUiAutocomplete Identified
Information
jQueryUiDialog Identified
jQueryUiDialog Identified
Information
jQueryUiTooltip Identified
jQueryUiTooltip Identified
Information
JqueryValidation Identified
JqueryValidation Identified
Information
Json Web Key Set Disclosure
Json Web Key Set Disclosure
Information
JSP Identified
JSP Identified
Information
JsTree Identified
JsTree Identified
Information
jszip Identified
jszip Identified
Information
JWT Detected
JWT Detected
Information
JWT Forgery via Chaining Jku Parameter with Open Redirect
JWT Forgery via Chaining Jku Parameter with Open Redirect
High
JWT Forgery via Path Traversal
JWT Forgery via Path Traversal
High
JWT Forgery via SQL Injection
JWT Forgery via SQL Injection
High
JWT Forgery via unvalidated jku parameter
JWT Forgery via unvalidated jku parameter
High
JWT kid Parameter Out of Band Command Injection
JWT kid Parameter Out of Band Command Injection
Critical
JWT Signature Bypass via None Algorithm
JWT Signature Bypass via None Algorithm
High
JWT Signature is not Verified
JWT Signature is not Verified
High
Kestrel Detected
Kestrel Detected
Information
Knockoutjs Identified
Knockoutjs Identified
Information
KnockoutMapping Identified
KnockoutMapping Identified
Information
Kong Identified
Kong Identified
Information
Laravel Debug Mode Enabled
Laravel Debug Mode Enabled
Low
Laravel Environment Configuration File Detected
Laravel Environment Configuration File Detected
Low
Lazyjs Identified
Lazyjs Identified
Information
LDAP Injection (IAST)
LDAP Injection (IAST)
Critical
Leaflet Identified
Leaflet Identified
Information
Liferay Digital Experience Platform Detected
Liferay Digital Experience Platform Detected
Information
Liferay Portal Detected
Liferay Portal Detected
Information
Lightbox Identified
Lightbox Identified
Information
Lighthouse Identified
Lighthouse Identified
Information
Lighttpd Identified
Lighttpd Identified
Information
LimeSurvey Detected
LimeSurvey Detected
Information
ListJs Identified
ListJs Identified
Information
LiteSpeed Web Server Identified
LiteSpeed Web Server Identified
Information
Local File Inclusion
Local File Inclusion
High
Local File Inclusion (IAST)
Local File Inclusion (IAST)
High
Lodash Identified
Lodash Identified
Information
Log File Detected
Log File Detected
Information
Login Page Identified
Login Page Identified
Information
Lua Identified
Lua Identified
Information
Magento Identified
Magento Identified
Information
Mail Header Injection (IAST)
Mail Header Injection (IAST)
Critical
Mailman Identified
Mailman Identified
Information
Malware Identified
Malware Identified
Critical
MarionetteJs Identified
MarionetteJs Identified
Information
1