🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
APIÂ Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Cost Savings Calculator
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Live Training
Partners
Documentation
Get a demo
Web Application Vulnerabilities Index
This page lists
144
vulnerabilities categorized as medium severity that can be detected by Invicti.
Select Category
Critical
High
Medium
Low
Best Practice
Information
Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Name
Classification
Severity
JBoss Enterprise Application Platform Identified
JBoss Enterprise Application Platform Identified
Information
JBoss Enterprise Application Platform Identified
JBoss Enterprise Application Platform Identified
Information
JBoss Web Console JMX Invoker
JBoss Web Console JMX Invoker
High
JQuery placeholder.js Identified
JQuery placeholder.js Identified
Information
JQuery placeholder.js Identified
JQuery placeholder.js Identified
Information
JSP Identified
JSP Identified
Information
JSP Identified
JSP Identified
Information
JWT Detected
JWT Detected
Information
JWT Forgery via Chaining Jku Parameter with Open Redirect
JWT Forgery via Chaining Jku Parameter with Open Redirect
High
JWT Forgery via Chaining Jku Parameter with Open Redirect
JWT Forgery via Chaining Jku Parameter with Open Redirect
High
JWT Forgery via Path Traversal
JWT Forgery via Path Traversal
High
JWT Forgery via Path Traversal
JWT Forgery via Path Traversal
High
JWT Forgery via SQL Injection
JWT Forgery via SQL Injection
High
JWT Forgery via SQL Injection
JWT Forgery via SQL Injection
High
JWT Forgery via unvalidated jku parameter
JWT Forgery via unvalidated jku parameter
High
JWT Forgery via unvalidated jku parameter
JWT Forgery via unvalidated jku parameter
High
JWT Signature Bypass via None Algorithm
JWT Signature Bypass via None Algorithm
High
JWT Signature Bypass via None Algorithm
JWT Signature Bypass via None Algorithm
High
JWT Signature is not Verified
JWT Signature is not Verified
High
JWT Signature is not Verified
JWT Signature is not Verified
High
JWT kid Parameter Out of Band Command Injection
JWT kid Parameter Out of Band Command Injection
Critical
JWT kid Parameter Out of Band Command Injection
JWT kid Parameter Out of Band Command Injection
Critical
Java Identified
Java Identified
Information
Java Identified
Java Identified
Information
Java Servlet Identified
Java Servlet Identified
Information
Java Servlet Identified
Java Servlet Identified
Information
Java Verb Tampering Via Misconfigured Security Constraint
Java Verb Tampering Via Misconfigured Security Constraint
Medium
Java Verb Tampering Via Misconfigured Security Constraint
Java Verb Tampering Via Misconfigured Security Constraint
Medium
JavaMelody Interface Detected
JavaMelody Interface Detected
Medium
JavaScriptCookie Identified
JavaScriptCookie Identified
Information
JavaScriptCookie Identified
JavaScriptCookie Identified
Information
Jenkins Identified
Jenkins Identified
Information
Jenkins Identified
Jenkins Identified
Information
JetBrains .idea Project Directory Detected
JetBrains .idea Project Directory Detected
Medium
JetBrains .idea Project Directory Detected
JetBrains .idea Project Directory Detected
Medium
Jetty Web Server Identified
Jetty Web Server Identified
Information
Jetty Web Server Identified
Jetty Web Server Identified
Information
Jolokia Identified
Jolokia Identified
Information
Jolokia Identified
Jolokia Identified
Information
Joomla Detected
Joomla Detected
Information
Joomla Detected
Joomla Detected
Information
JqueryMask Identified
JqueryMask Identified
Information
JqueryMask Identified
JqueryMask Identified
Information
JqueryValidation Identified
JqueryValidation Identified
Information
JqueryValidation Identified
JqueryValidation Identified
Information
JsTree Identified
JsTree Identified
Information
JsTree Identified
JsTree Identified
Information
Json Web Key Set Disclosure
Json Web Key Set Disclosure
Information
Json Web Key Set Disclosure
Json Web Key Set Disclosure
Information
Kestrel Detected
Kestrel Detected
Information
Kestrel Detected
Kestrel Detected
Information
KnockoutMapping Identified
KnockoutMapping Identified
Information
KnockoutMapping Identified
KnockoutMapping Identified
Information
Knockoutjs Identified
Knockoutjs Identified
Information
Knockoutjs Identified
Knockoutjs Identified
Information
Kong Identified
Kong Identified
Information
LDAP Injection (IAST)
LDAP Injection (IAST)
Critical
Laravel Debug Mode Enabled
Laravel Debug Mode Enabled
Low
Laravel Environment Configuration File Detected
Laravel Environment Configuration File Detected
Low
Lazyjs Identified
Lazyjs Identified
Information
Lazyjs Identified
Lazyjs Identified
Information
Leaflet Identified
Leaflet Identified
Information
Leaflet Identified
Leaflet Identified
Information
Liferay Digital Experience Platform Detected
Liferay Digital Experience Platform Detected
Information
Liferay Portal Detected
Liferay Portal Detected
Information
Lightbox Identified
Lightbox Identified
Information
Lightbox Identified
Lightbox Identified
Information
Lighthouse Identified
Lighthouse Identified
Information
Lighttpd Identified
Lighttpd Identified
Information
LimeSurvey Detected
LimeSurvey Detected
Information
ListJs Identified
ListJs Identified
Information
ListJs Identified
ListJs Identified
Information
LiteSpeed Web Server Identified
LiteSpeed Web Server Identified
Information
Local File Inclusion
Local File Inclusion
High
1