Vulnerability Database
Name | Severity |
---|---|
.NET Insecure Deserialization | high |
Administration consoles found | medium |
ASP.NET VIEWSTATE with MAC disabled | high |
Client-side Prototype Pollution | medium |
Client-Side Template Injection | high |
Communication is not secure | medium |
CORS misconfiguration | medium |
CORS misconfiguration | high |
Cross domain file inclusion | low |
Cross-Site Request Forgery | low |
Cross-Site Scripting | high |
Cross-Site Scripting in ASP.NET (cookieless session) | high |
Debug Messages Revealing Unnecessary Information | low |
Directory listing is enabled | medium |
DOM-based Cross-Site Scripting | high |
Enumerable Parameter | low |
Error message containing sensitive information | low |
Exposed Backup File | low |
Exposure of Sensitive Information | low |
HTTP Debug methods enabled | low |
HTTP/1.1 Request Smuggling | high |
HTTP/2 Request Smuggling | high |
Insecure client access policy | medium |
Insecure cookie setting: domain too loose | medium |
Insecure cookie setting: missing HttpOnly flag | medium |