Supported Tests by SmartScanner 365 tests foundVulnerability NameSeverityCWEApache 2.4.49 Path Traversal and RCEA vulnerability was discovered in Apache HTTP Server 2.4.49 related to changes made to path normalization. This flaw enables attackers to perform path traversal attacks,...HighCWE-22Apache Expect Header Cross Site ScriptingCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79Apache mod_jk Access Control BypassThe Apache Web Server (httpd) with Apache Tomcat JK (mod_jk) Connector versions 1.2.0 to 1.2.44 contains a flaw in path normalization, allowing specially crafted requests...HighApache mod_proxy 2.4.48 SSRFA vulnerability exists in Apache HTTP Server 2.4.48 and earlier versions, specifically within the mod_proxy module. An attacker can exploit this flaw by crafting a...MediumCWE-918Apache server-info enabledExposing the Apache server-info page allows attackers to gather detailed information about the server configuration, installed modules, and other system-related details, aiding potential attacks.MediumCWE-16Apache server-status enabledExposing the Apache server-status page allows attackers to gather detailed information about the server’s current state, facilitating potential attacks by revealing active connections, server uptime,...MediumCWE-16Apache Struts 2 Forced double OGNL evaluation S2-059The Apache Struts framework, when forced, performs double evaluation of attributes’ values assigned to certain tags attributes such as id. This allows attackers to pass...HighCWE-78Apache Struts 2 RCE S2-045Apache Struts 2 suffers from a Remote Code Execution (RCE) vulnerability, designated as S2-045. This vulnerability allows attackers to execute arbitrary commands on the server...HighCWE-78Apache Struts 2 REST plugin XStream RCE S2-052Apache Struts 2, specifically the REST Plugin, is susceptible to a Remote Code Execution (RCE) vulnerability identified as S2-052. This vulnerability arises due to the...HighCWE-78Apache Struts OGNL expression RCE S2-057A Remote Code Execution (RCE) attack is possible in Apache Struts when alwaysSelectFullNamespace is set to true (either by the user or by a plugin...HighCWE-78Apache Tomcat JSP Upload RCEApache Tomcat is susceptible to a Remote Code Execution (RCE) vulnerability when running on Windows with HTTP PUTs enabled. By sending a specially crafted request,...HighCWE-78Apache Tomcat Manager Login FoundBy default, the Tomcat Manager application should only be accessible from a browser running on the same machine as Tomcat. However, if the Manager login...MediumApache Version DisclosureA misconfigured web server may expose the Apache version number either in the Server HTTP header or in the body of error pages. Attackers leverage...InformationalCWE-200Application and Database ErrorAn application and database error occurs when the application encounters issues related to both its functionality and interaction with the database backend. Unhandled exceptions in...MediumCWE-209Application ErrorUnhandled exceptions pose two primary risks. Firstly, they can lead to denial of service by causing memory leaks or excessive resource consumption. Secondly, they may...MediumCWE-209Arbitrary Source Code DisclosureArbitrary Source Code Disclosure is a vulnerability that occurs when it’s possible to access the source code of any file on a web application, potentially...HighCWE-540ASP.NET Version DisclosureThe presence of the X-AspNet-Version and X-AspNetMvc-Version headers exposes the version of ASP.NET used by the web server, providing valuable information to attackers. This disclosure...InformationalCWE-200Auto Complete Enabled Password InputEnabling autocomplete for password input fields allows browsers to save and autofill sensitive information, such as passwords. This poses a security risk, particularly on shared...LowCWE-16Basic Authentication Over HTTPUsing Basic Authentication over HTTP exposes user credentials to potential interception by attackers who can sniff and capture HTTP traffic. This authentication method sends credentials...MediumCWE-319Blind OS Command ExecutionBlind OS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system...HighCWE-78Blind SQL InjectionBlind SQL Injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database without directly...HighCWE-89BREACH attackBREACH is a variant of the CRIME attack that targets HTTP compression, specifically gzip or DEFLATE algorithms used via the content-encoding option within HTTP. Attackers...LowCWE-310Broken LinkBroken hyperlinks in web pages can create a bad experience for the users. It can also affect the web page ranking in web search results....InformationalBrute Force Prevention BypassedBrute Force Prevention Bypassed occurs when software lacks adequate measures to counter multiple failed authentication attempts within a short time frame, rendering it vulnerable to...MediumCWE-307Buffer OverflowBuffer overflow occurs when an application accepts more data than it can handle, leading to data overflowing the designated memory space. This vulnerability can be...MediumCWE-119Content Character Encoding is not DefinedWhen the character encoding is not explicitly defined in web content, browsers may resort to guessing or using a default encoding. This can lead to...InformationalCWE-16Content-Security-Policy Header is MissingThe absence of the Content-Security-Policy (CSP) response header leaves a website vulnerable to various types of attacks, including Cross-Site Scripting (XSS) and data injection attacks....LowCWE-16Cookie Accessible for SubdomainsThe presence of the Domain attribute in the Set-Cookie header instructs browsers to send the cookie to any subdomains of the specified domain. This can...InformationalCWE-16Cookie without HttpOnly FlagThe absence of the HttpOnly flag in cookies allows JavaScript running on the client-side to access them through the Document.cookie API. This presents a security...LowCWE-1004Cookie without SameSite FlagThe absence of the SameSite flag in cookies leaves them vulnerable to cross-site request forgery (CSRF) attacks, where unauthorized actions are performed on behalf of...LowCWE-1275Cookie without Secure FlagThe absence of the Secure flag in cookies allows them to be transmitted over unencrypted connections, making them vulnerable to interception by attackers conducting man-in-the-middle...LowCWE-614CRIME (SPDY) attackThe CRIME (Compression Ratio Info-leak Made Easy) attack targets the SPDY protocol versions 3 and earlier, used in browsers like Mozilla Firefox and Google Chrome....LowCWE-310CRIME (SSL/TLS) attackCRIME (Compression Ratio Info-leak Made Easy) is a security exploit targeting secret web cookies transmitted over HTTPS and SPDY connections utilizing data compression. By analyzing...LowCWE-310CRLF Injection in URLCRLF injection involves injecting Carriage Return (ASCII 13, \r) and Line Feed (ASCII 10, \n) characters into web requests or responses. These characters are used...HighCWE-93Cross-Origin Resource Sharing AllowedCross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to allow a web application running at one origin to access selected resources...InformationalCWE-942Cross Site ScriptingCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79Database ErrorA database error occurs when the application encounters an issue while interacting with the database backend. Such errors can arise due to various factors, including...MediumCWE-209Detailed Application and Database ErrorDetailed application and database errors occur when the application encounters issues related to both its functionality and interaction with the database backend. These errors expose...MediumCWE-209Detailed Application ErrorDetailed application errors, caused by unhandled exceptions, pose two primary risks. Firstly, they can lead to denial of service by causing memory leaks or excessive...MediumCWE-209Directory Listing of Sensitive FilesDirectory listing of sensitive files occurs when directory listing, if enabled, exposes the complete index of resources within a directory to potential attackers. This can...LowCWE-548Directory ListingDirectory listing, when enabled, exposes the complete index of resources within a directory to potential attackers. This can lead to unauthorized access to sensitive files...LowCWE-548Drupal 4.1/4.2 XSSCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79Drupal 'Drupalgeddon2' Remote Code ExecutionA vulnerability in multiple subsystems of Drupal allows remote attackers to execute arbitrary operating system commands on the server, leading to potential compromise of the...HighCWE-78Drupal Module Cumulus Cross Site ScriptingCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79Drupal7 Pre Auth SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Email Address DisclosureThe disclosure of email addresses on webpages can make them vulnerable to harvesting by spambots, leading to an influx of unsolicited spam emails.InformationalCWE-200Expression Language InjectionExpression Language Injection (EL Injection) is a critical vulnerability that occurs when user inputs are used to construct dynamic expressions in web applications without proper...HighCWE-917File Upload FunctionalityThe <input> element with type="file" enables users to select and upload files from their device storage to a remote server. However, unrestricted file upload functionality...InformationalHidden Resource in Robots.txtHidden resources in robots.txt refer to sensitive paths or directories that are inadvertently exposed in the robots.txt file. The robots.txt file is used to instruct...MediumCWE-200Host Header InjectionDuring the processing of an incoming HTTP request, the web server relies on the Host HTTP header to determine which component or virtual host should...MediumHTTP Protocol Stack Remote Code Execution Vulnerability (DOS)A vulnerability in the Microsoft Windows HTTP Protocol Stack (HTTP.sys) allows remote attackers to execute arbitrary code or cause a system crash on the host...HighHTTP Response SplittingHTTP response splitting is the result of the failure of a web application to properly sanitize CR (ASCII 0x0D) and LF (ASCII 0x0A) character in...HighCWE-113Insecure Deserialization Remote Code ExecutionInsecure deserialization remote code execution is a critical security vulnerability that occurs when an application deserializes a user-supplied object string without properly verifying its integrity....HighCWE-502Insecure DeserializationInsecure deserialization occurs when an application deserializes a user-supplied object string without properly verifying its integrity. This vulnerability enables attackers to manipulate the system state...HighCWE-502Insecure Inline FrameWhen an inline frame tag (<iframe>) on a webpage references an external resource without the sandbox attribute set, it allows the external URL to manipulate...MediumCWE-829Internal Server ErrorAn internal server error occurs when the server encounters an unexpected condition that prevents it from fulfilling the request. This error can result from various...MediumCWE-755Joomla! 1.5 < 3.4.5 RCEOS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers...HighCWE-78Joomla! < 1.7.0 XSSCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79Joomla! 3.2.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Advertisement Board 3.1.0 'catname' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Aist 2.0 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component AllVideos Reloaded 1.2.x 'divid' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component CcNewsletter 2.x.x 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_cbcontact 'contact_id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_contenthistory SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_fields 3.7 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component com_hdwplayer 4.2 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_newsfeeds 1.0 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_rsgallery2 2.0 'catid' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_shop 'editid' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Com_shop 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component DT Register 3.2.7 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Fastball 2.5 'season' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component File Download Tracker 3.0 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Form Maker 3.6.12 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Google Map Landkarten 4.2.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component InviteX 3.0.5 'invite_type' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JB Bus 2.3 'order_number' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JCK Editor 6.4.4 'parent' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JCK Editor 6.4.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JEXTN Video Gallery 3.0.5 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JGive 2.0.9 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Jobs Factory 2.0.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JomEstate PRO 3.7 'id' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component JquickContact 1.3.2.2.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Music Collection 3.0.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component NextGen Editor 2.1.0 'plname' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Odudeprofile 2.8 'profession' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Reverse Auction Factory 4.3.8 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 'alias' SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Joomla! 'J2Store < 3.3.7' SQL InjectionA vulnerability in the J2Store component for Joomla! allows attackers to inject and execute SQL commands on the website’s database, potentially leading to data theft,...HighJoomla! Pinterest Clone Social Pinboard 2.0 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89Local File InclusionLocal File Inclusion (LFI) is a vulnerability that allows attackers to include local files, exploiting dynamic file inclusion mechanisms in the target application. This occurs...HighCWE-98Microsoft IIS Tilde Directory EnumerationIn some versions of Microsoft IIS, it is possible to detect the existence of files using an 8.3 short filename (SFN). This vulnerability allows attackers...MediumCWE-200Missing or Insecure Cache-Control HeaderWeb cache or HTTP cache is a system used to optimize web performance. Browsers cache the contents of a resource to reuse it on subsequent...InformationalCWE-525Nginx Code Execution due to MisconfigurationMisconfigurations in Nginx, particularly with PHP FPM (FastCGI Process Manager), can lead to a critical security vulnerability. Attackers can exploit this misconfiguration by appending /.php...HighCWE-16Nginx Integer OverflowNginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to an integer overflow vulnerability in the nginx range filter module. This vulnerability can...HighCWE-119Nginx Null Byte Code ExecutionAllowing null byte character (ASCII 0x00) in the URL can lead to a severe security risk. If the user can manipulate file contents on the...HighCWE-158Nginx Restriction Bypass via Space Character in URIA vulnerability in Nginx allows attackers to bypass security restrictions in specific configurations by exploiting a flaw in request URI processing. When an unescaped space...HighCWE-20Nginx Version DisclosureThe Server header reveals detailed information about the server application handling the request, including the Nginx version. Exposing this information can aid attackers in identifying...InformationalCWE-200No HTTPSIn HTTP communications, traffic is not encrypted and can be captured by an attacker who has access to a network interface. This exposes sensitive information...MediumCWE-319No Redirection from HTTP to HTTPSIn scenarios where HTTPS is enabled but HTTP requests are not automatically redirected to HTTPS, users must explicitly use the HTTPS URL to ensure encrypted...MediumCWE-311Old/Backup Resource FoundOld or backup files left accessible on a web server can inadvertently expose sensitive information such as source code, administrative interfaces, or credentials. These files...LowCWE-530Open Redirection In URLUnvalidated redirects and forwards occur when a web application accepts untrusted input that could redirect the user to a URL provided within the input. Attackers...HighCWE-601OS Command ExecutionOS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers...HighCWE-78Passive Mixed ContentWhen a user visits a page served over HTTPS, their connection with the web server is encrypted with TLS, protecting it from most sniffers and...LowCWE-319Password Input on HTTPWhen passwords are sent over unencrypted HTTP traffic, attackers can intercept and capture them easily, leading to unauthorized access to user accounts, sensitive data exposure,...MediumCWE-319Password Sent in HTTP QueryWhen passwords are included in URLs and sent as part of HTTP queries, they may be logged in various places, including server logs, and disclosed...MediumCWE-319Password Sent in QueryWhen passwords are included in URLs and sent as part of HTTP queries, they may be logged in various places, including server logs, and disclosed...LowCWE-598Password Sent Over HTTPWhen passwords are sent over unencrypted HTTP traffic, attackers can intercept and capture them easily, leading to unauthorized access to user accounts, sensitive data exposure,...MediumCWE-319Path Disclosure in Robots.txtPath disclosure in robots.txt occurs when sensitive paths or directories are inadvertently exposed in the robots.txt file. The robots.txt file is used to instruct web...InformationalCWE-200PHP Version DisclosureExposing the PHP version used by the server facilitates attackers in identifying vulnerabilities more easily. This information exposes the server to potential risks.InformationalCWE-200phpinfo() FoundThe phpinfo() method in PHP reveals extensive details about the PHP environment, including configuration settings, server information, and installed extensions. While useful for debugging and...MediumCWE-200Possible SQL InjectionPossible SQL Injection refers to a potential vulnerability where input data may be susceptible to SQL injection attacks. SQL injection is a type of attack...HighCWE-89Private IPv4 Address DisclosurePrivate IPv4 addresses are reserved for use within private networks such as local area networks (LANs). Revealing private IP addresses can provide insights into the...InformationalCWE-200Private IPv6 Address DisclosurePrivate IPv6 addresses are reserved for use within private networks and are not routable on the public Internet. Disclosing private IPv6 addresses can provide attackers...InformationalCWE-200ProfanityThe presence of profanity in web pages can create a negative user experience and may lead to decreased user engagement. Additionally, profanity can impact the...InformationalPublic-Key-Pins Header is SetThe HTTP Public-Key-Pins response header was used to associate a specific cryptographic public key with a web server to mitigate the risk of MITM attacks...InformationalCWE-16Redirection with BodyAn HTTP redirection (3XX status code) typically does not include a body. However, if a body is present in the redirection response, it indicates that...LowCWE-698Referrer-Policy Header is MissingThe Referrer-Policy HTTP header controls the amount of referrer information (sent via the Referer header) included with requests. The Referer header contains the address of...InformationalCWE-16Remote File DisclosureRemote File Disclosure (RFD) is a vulnerability that allows an attacker to disclose files located on remote servers, exploiting dynamic file inclusion mechanisms implemented in...HighCWE-98Remote File InclusionRemote File Inclusion (RFI) is a vulnerability that allows attackers to include remote files, exploiting dynamic file inclusion mechanisms in the target application. This occurs...HighCWE-98Remote URL InclusionRemote URL Inclusion (RUI) is a vulnerability that allows an attacker to include a remote URL, exploiting dynamic URL inclusion mechanisms implemented in the target...HighCWE-98Robots.txt FoundThe robots.txt file is used to instruct web robots on which parts of a website to avoid crawling or indexing. While intended for cooperation with...InformationalCWE-200Secure Renegotiation is not supportedWhen a server does not support secure renegotiation in SSL/TLS connections, it becomes vulnerable to content injection at the start of sessions. This vulnerability requires...LowCWE-310Sensitive Old/Backup Resource FoundSensitive Old/Backup Resource Found refers to old or backup files left accessible on a web server, which can inadvertently expose sensitive information such as source...MediumCWE-530Sensitive Unreferenced Resource FoundSensitive Unreferenced Resource Found refers to the discovery of sensitive resources within a web application that are not directly linked or referenced within the application...LowCWE-552Serialized Object FoundObject serialization allows transferring complex data structures over channels like HTTP. However, the presence of a serialized object within the application indicates potential vulnerabilities related...HighCWE-502Server Version DisclosureThe Server header describes the server application that handled the request. Detailed information in this header can expose the server to attackers. Using the information...LowCWE-200Session Cookie Accessible for SubdomainsWhen the Domain attribute is present in the Set-Cookie header, browsers send the cookie to any subdomains of the specified domain. This can result in...LowCWE-16Session Cookie without HttpOnly FlagThe absence of the HttpOnly flag in session cookies allows client-side JavaScript to access them, which poses a security risk. Without the HttpOnly flag, session...MediumCWE-1004Session Cookie without SameSite FlagThe absence of the SameSite flag in session cookies leaves them vulnerable to cross-site request forgery (CSRF) attacks, where unauthorized actions are performed on behalf...MediumCWE-1275Session Cookie without Secure FlagThe absence of the Secure flag in session cookies allows them to be transmitted over unencrypted connections, making them vulnerable to interception by attackers conducting...MediumCWE-614Source Code DisclosureSource code disclosure occurs when the source code of a web application is inadvertently exposed to users, potentially revealing sensitive information such as credentials, API...MediumCWE-540SQL Command DisclosureSQL commands reveal information about the structure of the underlying database. This information does not create any direct impact on the target, though it provides...InformationalCWE-89SQL InjectionSQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89SSL 2 enabledSSL version 2 is known to have numerous security vulnerabilities, rendering it highly insecure and susceptible to attacks.HighCWE-326SSL 3 enabledSSL version 3 is vulnerable to padding oracle attacks and other cryptographic weaknesses, making it insecure for use in secure communication.MediumCWE-326Strict-Transport-Security Header is MissingThe absence of the HTTP Strict-Transport-Security (HSTS) response header leaves a website vulnerable to protocol downgrade attacks and session hijacking. Without this header, attackers can...LowCWE-16Subresource Integrity is MissingSubresource Integrity (SRI) is a security feature that allows browsers to verify that resources fetched, such as from a content delivery network (CDN), are delivered...LowCWE-353The Heartbleed BugHeartbleed is a critical security vulnerability found in the OpenSSL cryptography library, used for implementing the Transport Layer Security (TLS) protocol. Attackers can exploit this...HighCWE-119The POODLE attackThe POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a vulnerability that exploits SSL 3.0 fallback mechanisms in internet and security software clients. Attackers...MediumCWE-327The ShellShock BugShellshock, also known as Bashdoor, is a critical vulnerability in the Unix Bash shell that allows attackers to execute arbitrary commands and gain unauthorized access....HighCWE-78Time Based SQL InjectionTime Based SQL Injection is a type of SQL injection attack where the attacker manipulates the timing of SQL query execution to infer information about...HighCWE-89TLS 1.0 enabledTLS version 1.0 is known to have several security vulnerabilities and weaknesses, making it susceptible to attacks.MediumCWE-326TLS 1.1 enabledTLS version 1.1 is known to have several security vulnerabilities and weaknesses, rendering it insecure for use.LowCWE-326Tomcat Version DisclosureExposing detailed information such as the Tomcat version number facilitates attackers in identifying vulnerabilities and planning their attacks more effectively.InformationalCWE-200TRACE Method AllowedThe HTTP TRACE method allows clients to view the entire request received by the web server, primarily for testing and diagnostic purposes. However, enabling this...LowCWE-16TRACK Method AllowedThe HTTP TRACK and TRACE methods allow the client to see the entire request that the web server has received. Although primarily intended for testing...LowCWE-16Unicode Transformation IssueThe Unicode Standard provides a unified encoding scheme for characters worldwide, enhancing program globalization and security. However, improper usage of Unicode can introduce security vulnerabilities,...HighCWE-176Unix Path DisclosureFile and directory paths reveal information about the structure of the file system of the underlying OS. While this information does not directly impact the...InformationalCWE-200Unreferenced Repository FoundUnreferenced repositories, such as those from version control systems like Git, SVN, CVS, and Mercurial, contain valuable information such as source code, historical changes, and...HighCWE-552Unreferenced Resource FoundUnreferenced resources in web applications may reveal sensitive information and provide attackers with insights into potential attack vectors. These resources, although not directly linked or...InformationalCWE-552Unreferenced Source Code DisclosureUnreferenced Source Code Disclosure is a vulnerability that occurs when a backup file or source code file of an application is accessible to users, potentially...HighCWE-540Unvalidated RedirectionUnvalidated redirects and forwards occur when a web application accepts untrusted input that could redirect the user to a URL provided within the input. Attackers...HighCWE-601User Controllable URLUser-controllable URLs refer to HTML attributes with a value type of URI, such as href in the a tag or src in the img tag....MediumCWE-20User EnumerationUser Enumeration occurs when web applications inadvertently reveal whether a username exists on the system, either due to misconfiguration or design decisions. Attackers exploit this...MediumCWE-209ViewState is not EncryptedThe ViewState, a hidden form input in ASP.NET pages, automatically persists information and application data specific to a page. If the ViewState is not encrypted,...InformationalCWE-200Vulnerable IIS VersionThe Internet Information Services (IIS) version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the...MediumWeak PasswordWeak Password vulnerabilities arise when applications fail to enforce strong password policies, making it easier for attackers to guess or crack users’ passwords, leading to...HighCWE-521Web Server Path TraversalWhen a web server fails to properly normalize and validate the ../ sequence in URL paths, it enables attackers to access files outside the intended...HighCWE-22Werkzeug Interactive Debugging is ActiveWerkzeug is a comprehensive WSGI web application library for the Python language. Werkzeug provides a WSGI middleware that renders nice tracebacks, optionally with an interactive...MediumCWE-1295Windows Path DisclosureFile and directory paths reveal information about the structure of the file system of the underlying OS. This information does not create any direct impact...InformationalCWE-200WordPress 4.6 Blind OS Command ExecutionPHPMailer before 5.2.18 allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code. It is possible to execute remote...HighCWE-78WordPress Plugin AdRotate 3.6.5 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin AdRotate 3.6.6 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin AdRotate 3.9.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin All Video Gallery 1.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Bannerize 2.8.6 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Bannerize 2.8.7 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Business Intelligence SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Chained Quiz 1.0.8 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Community Events 1.2.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin CP Multi View Event Calendar 1.01 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin CP Multi View Event Calendar 1.1.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin CP Multi View Event Calendar 1.1.7 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin DS FAQ 1.3.2 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Easy Contact Form Lite 1.0.7 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Event Registration 5.4.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Eventify Simple Events 1.7.f SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Facebook Promotions 1.3.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin File Groups 1.1.2 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin FireStorm Professional Real Estate 2.06.01 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Forum Server 1.7 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Glossary SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Google Document Embedder 2.5.14 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Google Document Embedder 2.5.16 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Hitasoft_player Ripe HD FLV Player 1.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Jetpack SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin JTRT Responsive Tables 4.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin KNR Author List Widget 2.0.0 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin LeagueManager 3.8 SQLIAn SQL Injection vulnerability exists in the league_id parameter of a function call made by the leaguemanager_export page.HighWordPress Plugin Link Library 5.2.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin NEX Forms 3.0 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Olimometer 2.56 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin OQey Headers 0.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Paid Downloads 2.01 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Post Highlights 2.2 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin SCORM Cloud 1.0.6.6 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin SH Slideshow 3.1.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Smart Google Code Inserter 3.5 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Tune Library 2.17 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Users Ultra 1.5.50 Blind SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin VideoWhisper Video Presentation 1.1 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin WP Fastest Cache 0.8.4.8 Blind SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin WP Statistics 13.0.7 Time Based SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin WP Support Plus Responsive Ticket System 7.1.3 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Wpfilemanager 6.8 RCEOS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers...HighCWE-78WordPress Plugin Yolink Search 1.1.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Plugin Zotpress 4.4 SQLISQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can...HighCWE-89WordPress Theme Akal XSSCross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users....HighCWE-79WordPress User EnumerationUser Enumeration occurs when web applications inadvertently reveal whether a username exists on the system, either due to misconfiguration or design decisions. Attackers exploit this...MediumCWE-209X-Content-Type-Options Header is MissingThe absence of the X-Content-Type-Options response HTTP header may expose a website to MIME sniffing attacks. MIME sniffing, performed by browsers when the MIME type...InformationalCWE-16X-Frame-Options Header is MissingThe absence of the X-Frame-Options HTTP response header leaves a website vulnerable to click-jacking attacks. Without this header, attackers can embed the site’s content into...LowCWE-1021X-Powered-By Header FoundThe presence of the X-Powered-By header reveals the technologies used by the web server, providing valuable information to attackers. This disclosure can aid attackers in...InformationalCWE-200X-XSS-Protection Header is SetThe HTTP X-XSS-Protection response header, originally designed for Internet Explorer, Chrome, and Safari, aimed to mitigate reflected cross-site scripting (XSS) attacks. However, its effectiveness has...InformationalCWE-16Unreferenced Login Page FoundUnreferenced Login Page Found refers to the discovery of login pages within a web application that are not directly linked or referenced within the application...MediumCWE-656WordPress Login Page FoundWordPress wp-login.php serves as the primary login page for both users and administrators. Attackers commonly exploit this page through password guessing and brute force attacks...MediumPHP CGI Argument Injection RCEIn PHP, when configured as a CGI script (php-cgi), improper handling of certain query strings can allow remote attackers to execute arbitrary code. Specifically, query...HighCWE-78Vulnerable Apache VersionThe Apache HTTP Server version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server,...MediumVulnerable WordPress VersionThe WordPress version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the website, leading to...HighVulnerable PHP VersionThe PHP version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to...MediumInsecure Direct Object Reference (IDOR)IDOR occurs when an application provides direct access to objects based on user input without proper authorization checks. This vulnerability allows attackers to manipulate object...HighCWE-639Vulnerable Nginx VersionThe Nginx version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to...MediumVulnerable OpenSSL VersionThe OpenSSL version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to...MediumVulnerable Tomcat VersionThe Apache Tomcat version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading...Medium