Attackers have an ever increasing list of weaknesses in the web application structure at their disposal, which they can exploit to accomplish a wide variety of malicious tasks.
New flaws in web application security measures are constantly being researched, both by hackers and by security professionals. Most of these flaws affect all dynamic web applications whilst others are dependent on specific application technologies. In both cases, one may observe how the evolution and refinement of web technologies also brings about new exploits which compromise sensitive databases, provide access to theoretically secure networks, and pose a threat to the daily operation of online businesses.
The following is a list of known web application vulnerabilities/threats. Acunetix is also able to scan hundreds of well known applications such as WordPress, PHPNuke, PHPMyAdmin, Mambo, phpBB, OpenX… heuristicly for the detection of those exploits which have not yet been identified and tagged.
Subscribe to Acunetix Web Application Security Blog to keep up to date with the latest web security news.
View Vulnerabilities by Severity
High-severity type vulnerabilities that Acunetix checks for. Malicious users can exploit such vulnerabilities to compromise the integrity and avaibility of the target site, gain access to backend systems and databases as well as deface the target site and trick users into phishing attacks.
Medium-severity type vulnerabilities that Acunetix checks for. Such vulnerabilities should be investigated further to ensure they will not escalate to more severe problems.
Low-severity type vulnerabilities that Acunetix checks for.
Informational alerts raised by Acunetix.