Supported Tests by SmartScanner 365 tests found Vulnerability Name Severity CWE Apache 2.4.49 Path Traversal and RCE A vulnerability was discovered in Apache HTTP Server 2.4.49 related to changes made to path normalization. This flaw enables attackers to perform path traversal attacks,... High CWE-22 Apache Expect Header Cross Site Scripting Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 Apache mod_jk Access Control Bypass The Apache Web Server (httpd) with Apache Tomcat JK (mod_jk) Connector versions 1.2.0 to 1.2.44 contains a flaw in path normalization, allowing specially crafted requests... High Apache mod_proxy 2.4.48 SSRF A vulnerability exists in Apache HTTP Server 2.4.48 and earlier versions, specifically within the mod_proxy module. An attacker can exploit this flaw by crafting a... Medium CWE-918 Apache server-info enabled Exposing the Apache server-info page allows attackers to gather detailed information about the server configuration, installed modules, and other system-related details, aiding potential attacks. Medium CWE-16 Apache server-status enabled Exposing the Apache server-status page allows attackers to gather detailed information about the server’s current state, facilitating potential attacks by revealing active connections, server uptime,... Medium CWE-16 Apache Struts 2 Forced double OGNL evaluation S2-059 The Apache Struts framework, when forced, performs double evaluation of attributes’ values assigned to certain tags attributes such as id. This allows attackers to pass... High CWE-78 Apache Struts 2 RCE S2-045 Apache Struts 2 suffers from a Remote Code Execution (RCE) vulnerability, designated as S2-045. This vulnerability allows attackers to execute arbitrary commands on the server... High CWE-78 Apache Struts 2 REST plugin XStream RCE S2-052 Apache Struts 2, specifically the REST Plugin, is susceptible to a Remote Code Execution (RCE) vulnerability identified as S2-052. This vulnerability arises due to the... High CWE-78 Apache Struts OGNL expression RCE S2-057 A Remote Code Execution (RCE) attack is possible in Apache Struts when alwaysSelectFullNamespace is set to true (either by the user or by a plugin... High CWE-78 Apache Tomcat JSP Upload RCE Apache Tomcat is susceptible to a Remote Code Execution (RCE) vulnerability when running on Windows with HTTP PUTs enabled. By sending a specially crafted request,... High CWE-78 Apache Tomcat Manager Login Found By default, the Tomcat Manager application should only be accessible from a browser running on the same machine as Tomcat. However, if the Manager login... Medium Apache Version Disclosure A misconfigured web server may expose the Apache version number either in the Server HTTP header or in the body of error pages. Attackers leverage... Informational CWE-200 Application and Database Error An application and database error occurs when the application encounters issues related to both its functionality and interaction with the database backend. Unhandled exceptions in... Medium CWE-209 Application Error Unhandled exceptions pose two primary risks. Firstly, they can lead to denial of service by causing memory leaks or excessive resource consumption. Secondly, they may... Medium CWE-209 Arbitrary Source Code Disclosure Arbitrary Source Code Disclosure is a vulnerability that occurs when it’s possible to access the source code of any file on a web application, potentially... High CWE-540 ASP.NET Version Disclosure The presence of the X-AspNet-Version and X-AspNetMvc-Version headers exposes the version of ASP.NET used by the web server, providing valuable information to attackers. This disclosure... Informational CWE-200 Auto Complete Enabled Password Input Enabling autocomplete for password input fields allows browsers to save and autofill sensitive information, such as passwords. This poses a security risk, particularly on shared... Low CWE-16 Basic Authentication Over HTTP Using Basic Authentication over HTTP exposes user credentials to potential interception by attackers who can sniff and capture HTTP traffic. This authentication method sends credentials... Medium CWE-319 Blind OS Command Execution Blind OS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system... High CWE-78 Blind SQL Injection Blind SQL Injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database without directly... High CWE-89 BREACH attack BREACH is a variant of the CRIME attack that targets HTTP compression, specifically gzip or DEFLATE algorithms used via the content-encoding option within HTTP. Attackers... Low CWE-310 Broken Link Broken hyperlinks in web pages can create a bad experience for the users. It can also affect the web page ranking in web search results.... Informational Brute Force Prevention Bypassed Brute Force Prevention Bypassed occurs when software lacks adequate measures to counter multiple failed authentication attempts within a short time frame, rendering it vulnerable to... Medium CWE-307 Buffer Overflow Buffer overflow occurs when an application accepts more data than it can handle, leading to data overflowing the designated memory space. This vulnerability can be... Medium CWE-119 Content Character Encoding is not Defined When the character encoding is not explicitly defined in web content, browsers may resort to guessing or using a default encoding. This can lead to... Informational CWE-16 Content-Security-Policy Header is Missing The absence of the Content-Security-Policy (CSP) response header leaves a website vulnerable to various types of attacks, including Cross-Site Scripting (XSS) and data injection attacks.... Low CWE-16 Cookie Accessible for Subdomains The presence of the Domain attribute in the Set-Cookie header instructs browsers to send the cookie to any subdomains of the specified domain. This can... Informational CWE-16 Cookie without HttpOnly Flag The absence of the HttpOnly flag in cookies allows JavaScript running on the client-side to access them through the Document.cookie API. This presents a security... Low CWE-1004 Cookie without SameSite Flag The absence of the SameSite flag in cookies leaves them vulnerable to cross-site request forgery (CSRF) attacks, where unauthorized actions are performed on behalf of... Low CWE-1275 Cookie without Secure Flag The absence of the Secure flag in cookies allows them to be transmitted over unencrypted connections, making them vulnerable to interception by attackers conducting man-in-the-middle... Low CWE-614 CRIME (SPDY) attack The CRIME (Compression Ratio Info-leak Made Easy) attack targets the SPDY protocol versions 3 and earlier, used in browsers like Mozilla Firefox and Google Chrome.... Low CWE-310 CRIME (SSL/TLS) attack CRIME (Compression Ratio Info-leak Made Easy) is a security exploit targeting secret web cookies transmitted over HTTPS and SPDY connections utilizing data compression. By analyzing... Low CWE-310 CRLF Injection in URL CRLF injection involves injecting Carriage Return (ASCII 13, \r) and Line Feed (ASCII 10, \n) characters into web requests or responses. These characters are used... High CWE-93 Cross-Origin Resource Sharing Allowed Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to allow a web application running at one origin to access selected resources... Informational CWE-942 Cross Site Scripting Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 Database Error A database error occurs when the application encounters an issue while interacting with the database backend. Such errors can arise due to various factors, including... Medium CWE-209 Detailed Application and Database Error Detailed application and database errors occur when the application encounters issues related to both its functionality and interaction with the database backend. These errors expose... Medium CWE-209 Detailed Application Error Detailed application errors, caused by unhandled exceptions, pose two primary risks. Firstly, they can lead to denial of service by causing memory leaks or excessive... Medium CWE-209 Directory Listing of Sensitive Files Directory listing of sensitive files occurs when directory listing, if enabled, exposes the complete index of resources within a directory to potential attackers. This can... Low CWE-548 Directory Listing Directory listing, when enabled, exposes the complete index of resources within a directory to potential attackers. This can lead to unauthorized access to sensitive files... Low CWE-548 Drupal 4.1/4.2 XSS Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 Drupal 'Drupalgeddon2' Remote Code Execution A vulnerability in multiple subsystems of Drupal allows remote attackers to execute arbitrary operating system commands on the server, leading to potential compromise of the... High CWE-78 Drupal Module Cumulus Cross Site Scripting Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 Drupal7 Pre Auth SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Email Address Disclosure The disclosure of email addresses on webpages can make them vulnerable to harvesting by spambots, leading to an influx of unsolicited spam emails. Informational CWE-200 Expression Language Injection Expression Language Injection (EL Injection) is a critical vulnerability that occurs when user inputs are used to construct dynamic expressions in web applications without proper... High CWE-917 File Upload Functionality The <input> element with type="file" enables users to select and upload files from their device storage to a remote server. However, unrestricted file upload functionality... Informational Hidden Resource in Robots.txt Hidden resources in robots.txt refer to sensitive paths or directories that are inadvertently exposed in the robots.txt file. The robots.txt file is used to instruct... Medium CWE-200 Host Header Injection During the processing of an incoming HTTP request, the web server relies on the Host HTTP header to determine which component or virtual host should... Medium HTTP Protocol Stack Remote Code Execution Vulnerability (DOS) A vulnerability in the Microsoft Windows HTTP Protocol Stack (HTTP.sys) allows remote attackers to execute arbitrary code or cause a system crash on the host... High HTTP Response Splitting HTTP response splitting is the result of the failure of a web application to properly sanitize CR (ASCII 0x0D) and LF (ASCII 0x0A) character in... High CWE-113 Insecure Deserialization Remote Code Execution Insecure deserialization remote code execution is a critical security vulnerability that occurs when an application deserializes a user-supplied object string without properly verifying its integrity.... High CWE-502 Insecure Deserialization Insecure deserialization occurs when an application deserializes a user-supplied object string without properly verifying its integrity. This vulnerability enables attackers to manipulate the system state... High CWE-502 Insecure Inline Frame When an inline frame tag (<iframe>) on a webpage references an external resource without the sandbox attribute set, it allows the external URL to manipulate... Medium CWE-829 Internal Server Error An internal server error occurs when the server encounters an unexpected condition that prevents it from fulfilling the request. This error can result from various... Medium CWE-755 Joomla! 1.5 < 3.4.5 RCE OS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers... High CWE-78 Joomla! < 1.7.0 XSS Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 Joomla! 3.2.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Advertisement Board 3.1.0 'catname' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Aist 2.0 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component AllVideos Reloaded 1.2.x 'divid' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component CcNewsletter 2.x.x 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_cbcontact 'contact_id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_contenthistory SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_fields 3.7 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component com_hdwplayer 4.2 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_newsfeeds 1.0 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_rsgallery2 2.0 'catid' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_shop 'editid' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Com_shop 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component DT Register 3.2.7 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Fastball 2.5 'season' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component File Download Tracker 3.0 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Form Maker 3.6.12 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Google Map Landkarten 4.2.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component InviteX 3.0.5 'invite_type' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JB Bus 2.3 'order_number' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JCK Editor 6.4.4 'parent' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JCK Editor 6.4.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JEXTN Video Gallery 3.0.5 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JGive 2.0.9 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Jobs Factory 2.0.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JomEstate PRO 3.7 'id' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component JquickContact 1.3.2.2.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Music Collection 3.0.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component NextGen Editor 2.1.0 'plname' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Odudeprofile 2.8 'profession' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Reverse Auction Factory 4.3.8 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 'alias' SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Joomla! 'J2Store < 3.3.7' SQL Injection A vulnerability in the J2Store component for Joomla! allows attackers to inject and execute SQL commands on the website’s database, potentially leading to data theft,... High Joomla! Pinterest Clone Social Pinboard 2.0 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 Local File Inclusion Local File Inclusion (LFI) is a vulnerability that allows attackers to include local files, exploiting dynamic file inclusion mechanisms in the target application. This occurs... High CWE-98 Microsoft IIS Tilde Directory Enumeration In some versions of Microsoft IIS, it is possible to detect the existence of files using an 8.3 short filename (SFN). This vulnerability allows attackers... Medium CWE-200 Missing or Insecure Cache-Control Header Web cache or HTTP cache is a system used to optimize web performance. Browsers cache the contents of a resource to reuse it on subsequent... Informational CWE-525 Nginx Code Execution due to Misconfiguration Misconfigurations in Nginx, particularly with PHP FPM (FastCGI Process Manager), can lead to a critical security vulnerability. Attackers can exploit this misconfiguration by appending /.php... High CWE-16 Nginx Integer Overflow Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to an integer overflow vulnerability in the nginx range filter module. This vulnerability can... High CWE-119 Nginx Null Byte Code Execution Allowing null byte character (ASCII 0x00) in the URL can lead to a severe security risk. If the user can manipulate file contents on the... High CWE-158 Nginx Restriction Bypass via Space Character in URI A vulnerability in Nginx allows attackers to bypass security restrictions in specific configurations by exploiting a flaw in request URI processing. When an unescaped space... High CWE-20 Nginx Version Disclosure The Server header reveals detailed information about the server application handling the request, including the Nginx version. Exposing this information can aid attackers in identifying... Informational CWE-200 No HTTPS In HTTP communications, traffic is not encrypted and can be captured by an attacker who has access to a network interface. This exposes sensitive information... Medium CWE-319 No Redirection from HTTP to HTTPS In scenarios where HTTPS is enabled but HTTP requests are not automatically redirected to HTTPS, users must explicitly use the HTTPS URL to ensure encrypted... Medium CWE-311 Old/Backup Resource Found Old or backup files left accessible on a web server can inadvertently expose sensitive information such as source code, administrative interfaces, or credentials. These files... Low CWE-530 Open Redirection In URL Unvalidated redirects and forwards occur when a web application accepts untrusted input that could redirect the user to a URL provided within the input. Attackers... High CWE-601 OS Command Execution OS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers... High CWE-78 Passive Mixed Content When a user visits a page served over HTTPS, their connection with the web server is encrypted with TLS, protecting it from most sniffers and... Low CWE-319 Password Input on HTTP When passwords are sent over unencrypted HTTP traffic, attackers can intercept and capture them easily, leading to unauthorized access to user accounts, sensitive data exposure,... Medium CWE-319 Password Sent in HTTP Query When passwords are included in URLs and sent as part of HTTP queries, they may be logged in various places, including server logs, and disclosed... Medium CWE-319 Password Sent in Query When passwords are included in URLs and sent as part of HTTP queries, they may be logged in various places, including server logs, and disclosed... Low CWE-598 Password Sent Over HTTP When passwords are sent over unencrypted HTTP traffic, attackers can intercept and capture them easily, leading to unauthorized access to user accounts, sensitive data exposure,... Medium CWE-319 Path Disclosure in Robots.txt Path disclosure in robots.txt occurs when sensitive paths or directories are inadvertently exposed in the robots.txt file. The robots.txt file is used to instruct web... Informational CWE-200 PHP Version Disclosure Exposing the PHP version used by the server facilitates attackers in identifying vulnerabilities more easily. This information exposes the server to potential risks. Informational CWE-200 phpinfo() Found The phpinfo() method in PHP reveals extensive details about the PHP environment, including configuration settings, server information, and installed extensions. While useful for debugging and... Medium CWE-200 Possible SQL Injection Possible SQL Injection refers to a potential vulnerability where input data may be susceptible to SQL injection attacks. SQL injection is a type of attack... High CWE-89 Private IPv4 Address Disclosure Private IPv4 addresses are reserved for use within private networks such as local area networks (LANs). Revealing private IP addresses can provide insights into the... Informational CWE-200 Private IPv6 Address Disclosure Private IPv6 addresses are reserved for use within private networks and are not routable on the public Internet. Disclosing private IPv6 addresses can provide attackers... Informational CWE-200 Profanity The presence of profanity in web pages can create a negative user experience and may lead to decreased user engagement. Additionally, profanity can impact the... Informational Public-Key-Pins Header is Set The HTTP Public-Key-Pins response header was used to associate a specific cryptographic public key with a web server to mitigate the risk of MITM attacks... Informational CWE-16 Redirection with Body An HTTP redirection (3XX status code) typically does not include a body. However, if a body is present in the redirection response, it indicates that... Low CWE-698 Referrer-Policy Header is Missing The Referrer-Policy HTTP header controls the amount of referrer information (sent via the Referer header) included with requests. The Referer header contains the address of... Informational CWE-16 Remote File Disclosure Remote File Disclosure (RFD) is a vulnerability that allows an attacker to disclose files located on remote servers, exploiting dynamic file inclusion mechanisms implemented in... High CWE-98 Remote File Inclusion Remote File Inclusion (RFI) is a vulnerability that allows attackers to include remote files, exploiting dynamic file inclusion mechanisms in the target application. This occurs... High CWE-98 Remote URL Inclusion Remote URL Inclusion (RUI) is a vulnerability that allows an attacker to include a remote URL, exploiting dynamic URL inclusion mechanisms implemented in the target... High CWE-98 Robots.txt Found The robots.txt file is used to instruct web robots on which parts of a website to avoid crawling or indexing. While intended for cooperation with... Informational CWE-200 Secure Renegotiation is not supported When a server does not support secure renegotiation in SSL/TLS connections, it becomes vulnerable to content injection at the start of sessions. This vulnerability requires... Low CWE-310 Sensitive Old/Backup Resource Found Sensitive Old/Backup Resource Found refers to old or backup files left accessible on a web server, which can inadvertently expose sensitive information such as source... Medium CWE-530 Sensitive Unreferenced Resource Found Sensitive Unreferenced Resource Found refers to the discovery of sensitive resources within a web application that are not directly linked or referenced within the application... Low CWE-552 Serialized Object Found Object serialization allows transferring complex data structures over channels like HTTP. However, the presence of a serialized object within the application indicates potential vulnerabilities related... High CWE-502 Server Version Disclosure The Server header describes the server application that handled the request. Detailed information in this header can expose the server to attackers. Using the information... Low CWE-200 Session Cookie Accessible for Subdomains When the Domain attribute is present in the Set-Cookie header, browsers send the cookie to any subdomains of the specified domain. This can result in... Low CWE-16 Session Cookie without HttpOnly Flag The absence of the HttpOnly flag in session cookies allows client-side JavaScript to access them, which poses a security risk. Without the HttpOnly flag, session... Medium CWE-1004 Session Cookie without SameSite Flag The absence of the SameSite flag in session cookies leaves them vulnerable to cross-site request forgery (CSRF) attacks, where unauthorized actions are performed on behalf... Medium CWE-1275 Session Cookie without Secure Flag The absence of the Secure flag in session cookies allows them to be transmitted over unencrypted connections, making them vulnerable to interception by attackers conducting... Medium CWE-614 Source Code Disclosure Source code disclosure occurs when the source code of a web application is inadvertently exposed to users, potentially revealing sensitive information such as credentials, API... Medium CWE-540 SQL Command Disclosure SQL commands reveal information about the structure of the underlying database. This information does not create any direct impact on the target, though it provides... Informational CWE-89 SQL Injection SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 SSL 2 enabled SSL version 2 is known to have numerous security vulnerabilities, rendering it highly insecure and susceptible to attacks. High CWE-326 SSL 3 enabled SSL version 3 is vulnerable to padding oracle attacks and other cryptographic weaknesses, making it insecure for use in secure communication. Medium CWE-326 Strict-Transport-Security Header is Missing The absence of the HTTP Strict-Transport-Security (HSTS) response header leaves a website vulnerable to protocol downgrade attacks and session hijacking. Without this header, attackers can... Low CWE-16 Subresource Integrity is Missing Subresource Integrity (SRI) is a security feature that allows browsers to verify that resources fetched, such as from a content delivery network (CDN), are delivered... Low CWE-353 The Heartbleed Bug Heartbleed is a critical security vulnerability found in the OpenSSL cryptography library, used for implementing the Transport Layer Security (TLS) protocol. Attackers can exploit this... High CWE-119 The POODLE attack The POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a vulnerability that exploits SSL 3.0 fallback mechanisms in internet and security software clients. Attackers... Medium CWE-327 The ShellShock Bug Shellshock, also known as Bashdoor, is a critical vulnerability in the Unix Bash shell that allows attackers to execute arbitrary commands and gain unauthorized access.... High CWE-78 Time Based SQL Injection Time Based SQL Injection is a type of SQL injection attack where the attacker manipulates the timing of SQL query execution to infer information about... High CWE-89 TLS 1.0 enabled TLS version 1.0 is known to have several security vulnerabilities and weaknesses, making it susceptible to attacks. Medium CWE-326 TLS 1.1 enabled TLS version 1.1 is known to have several security vulnerabilities and weaknesses, rendering it insecure for use. Low CWE-326 Tomcat Version Disclosure Exposing detailed information such as the Tomcat version number facilitates attackers in identifying vulnerabilities and planning their attacks more effectively. Informational CWE-200 TRACE Method Allowed The HTTP TRACE method allows clients to view the entire request received by the web server, primarily for testing and diagnostic purposes. However, enabling this... Low CWE-16 TRACK Method Allowed The HTTP TRACK and TRACE methods allow the client to see the entire request that the web server has received. Although primarily intended for testing... Low CWE-16 Unicode Transformation Issue The Unicode Standard provides a unified encoding scheme for characters worldwide, enhancing program globalization and security. However, improper usage of Unicode can introduce security vulnerabilities,... High CWE-176 Unix Path Disclosure File and directory paths reveal information about the structure of the file system of the underlying OS. While this information does not directly impact the... Informational CWE-200 Unreferenced Repository Found Unreferenced repositories, such as those from version control systems like Git, SVN, CVS, and Mercurial, contain valuable information such as source code, historical changes, and... High CWE-552 Unreferenced Resource Found Unreferenced resources in web applications may reveal sensitive information and provide attackers with insights into potential attack vectors. These resources, although not directly linked or... Informational CWE-552 Unreferenced Source Code Disclosure Unreferenced Source Code Disclosure is a vulnerability that occurs when a backup file or source code file of an application is accessible to users, potentially... High CWE-540 Unvalidated Redirection Unvalidated redirects and forwards occur when a web application accepts untrusted input that could redirect the user to a URL provided within the input. Attackers... High CWE-601 User Controllable URL User-controllable URLs refer to HTML attributes with a value type of URI, such as href in the a tag or src in the img tag.... Medium CWE-20 User Enumeration User Enumeration occurs when web applications inadvertently reveal whether a username exists on the system, either due to misconfiguration or design decisions. Attackers exploit this... Medium CWE-209 ViewState is not Encrypted The ViewState, a hidden form input in ASP.NET pages, automatically persists information and application data specific to a page. If the ViewState is not encrypted,... Informational CWE-200 Vulnerable IIS Version The Internet Information Services (IIS) version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the... Medium Weak Password Weak Password vulnerabilities arise when applications fail to enforce strong password policies, making it easier for attackers to guess or crack users’ passwords, leading to... High CWE-521 Web Server Path Traversal When a web server fails to properly normalize and validate the ../ sequence in URL paths, it enables attackers to access files outside the intended... High CWE-22 Werkzeug Interactive Debugging is Active Werkzeug is a comprehensive WSGI web application library for the Python language. Werkzeug provides a WSGI middleware that renders nice tracebacks, optionally with an interactive... Medium CWE-1295 Windows Path Disclosure File and directory paths reveal information about the structure of the file system of the underlying OS. This information does not create any direct impact... Informational CWE-200 WordPress 4.6 Blind OS Command Execution PHPMailer before 5.2.18 allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code. It is possible to execute remote... High CWE-78 WordPress Plugin AdRotate 3.6.5 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin AdRotate 3.6.6 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin AdRotate 3.9.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin All Video Gallery 1.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Bannerize 2.8.6 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Bannerize 2.8.7 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Business Intelligence SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Chained Quiz 1.0.8 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Community Events 1.2.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin CP Multi View Event Calendar 1.01 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin CP Multi View Event Calendar 1.1.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin CP Multi View Event Calendar 1.1.7 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin DS FAQ 1.3.2 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Easy Contact Form Lite 1.0.7 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Event Registration 5.4.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Eventify Simple Events 1.7.f SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Facebook Promotions 1.3.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin File Groups 1.1.2 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin FireStorm Professional Real Estate 2.06.01 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Forum Server 1.7 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Glossary SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Google Document Embedder 2.5.14 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Google Document Embedder 2.5.16 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Hitasoft_player Ripe HD FLV Player 1.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Jetpack SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin JTRT Responsive Tables 4.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin KNR Author List Widget 2.0.0 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin LeagueManager 3.8 SQLI An SQL Injection vulnerability exists in the league_id parameter of a function call made by the leaguemanager_export page. High WordPress Plugin Link Library 5.2.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin NEX Forms 3.0 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Olimometer 2.56 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin OQey Headers 0.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Paid Downloads 2.01 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Post Highlights 2.2 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin SCORM Cloud 1.0.6.6 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin SH Slideshow 3.1.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Smart Google Code Inserter 3.5 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Tune Library 2.17 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Users Ultra 1.5.50 Blind SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin VideoWhisper Video Presentation 1.1 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin WP Fastest Cache 0.8.4.8 Blind SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin WP Statistics 13.0.7 Time Based SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin WP Support Plus Responsive Ticket System 7.1.3 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Wpfilemanager 6.8 RCE OS Command Execution, also known as Command Injection, is a severe vulnerability that allows attackers to execute arbitrary commands on the host operating system. Attackers... High CWE-78 WordPress Plugin Yolink Search 1.1.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Plugin Zotpress 4.4 SQLI SQL injection is a type of attack where malicious SQL queries are inserted into input data, allowing attackers to manipulate the database. Successful exploitation can... High CWE-89 WordPress Theme Akal XSS Cross-Site Scripting (XSS) attacks occur when malicious scripts are injected into trusted websites, often through user inputs, and executed in the browsers of other users.... High CWE-79 WordPress User Enumeration User Enumeration occurs when web applications inadvertently reveal whether a username exists on the system, either due to misconfiguration or design decisions. Attackers exploit this... Medium CWE-209 X-Content-Type-Options Header is Missing The absence of the X-Content-Type-Options response HTTP header may expose a website to MIME sniffing attacks. MIME sniffing, performed by browsers when the MIME type... Informational CWE-16 X-Frame-Options Header is Missing The absence of the X-Frame-Options HTTP response header leaves a website vulnerable to click-jacking attacks. Without this header, attackers can embed the site’s content into... Low CWE-1021 X-Powered-By Header Found The presence of the X-Powered-By header reveals the technologies used by the web server, providing valuable information to attackers. This disclosure can aid attackers in... Informational CWE-200 X-XSS-Protection Header is Set The HTTP X-XSS-Protection response header, originally designed for Internet Explorer, Chrome, and Safari, aimed to mitigate reflected cross-site scripting (XSS) attacks. However, its effectiveness has... Informational CWE-16 Unreferenced Login Page Found Unreferenced Login Page Found refers to the discovery of login pages within a web application that are not directly linked or referenced within the application... Medium CWE-656 WordPress Login Page Found WordPress wp-login.php serves as the primary login page for both users and administrators. Attackers commonly exploit this page through password guessing and brute force attacks... Medium PHP CGI Argument Injection RCE In PHP, when configured as a CGI script (php-cgi), improper handling of certain query strings can allow remote attackers to execute arbitrary code. Specifically, query... High CWE-78 Vulnerable Apache Version The Apache HTTP Server version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server,... Medium Vulnerable Nginx Version The Nginx version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to... Medium Vulnerable OpenSSL Version The OpenSSL version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to... Medium Vulnerable PHP Version The PHP version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading to... Medium Vulnerable Tomcat Version The Apache Tomcat version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the server, leading... Medium Vulnerable WordPress Version The WordPress version used is outdated and has security flaws. Vulnerabilities in older versions could be exploited by attackers to compromise the website, leading to... High