Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo
WEB APPLICATION VULNERABILITIES Standard & Premium

Abuse Of Functionality Vulnerabilities

CATEGORIES
SEVERITY
  • Severity

  • Critical
  • High
  • Medium
  • Low
  • Informational
  • Vulnerability Categories

  • Abuse Of Functionality
  • Acumonitor
  • Arbitrary File Creation
  • Arbitrary File Read
  • Arbitrary File Write
  • Authentication Bypass
  • BOLA
  • Bruteforce Possible
  • Buffer Overflow
  • CSRF
  • CSTI
  • Code Execution
  • Configuration
  • Crlf Injection
  • Deepscan
  • Default Credentials
  • Denial-of-service
  • Dev Files
  • Directory Listing
  • Directory Traversal
  • Eli Injection
  • Error Handling
  • File Inclusion
  • Http Parameter Pollution
  • Http Response Splitting
  • Information Disclosure
  • Insecure Admin Access
  • Insecure Deserialization
  • Internal Ip Disclosure
  • Known Vulnerabilitie
  • Known Vulnerabilities
  • Ldap Injection
  • Malware
  • Missing Update
  • Path Traversal
  • Privilege Escalation
  • Remote Code Execution
  • SSRF
  • SSTI
  • Sensitive Data Not Over Ssl
  • Server Side Template Injection
  • Session Fixation
  • Source Code Disclosure
  • Sql Injection
  • Test Files
  • Unauthenticated File Upload
  • Url Redirection
  • Weak Credentials
  • Weak Crypto
  • XFS
  • XSS
  • XXE
  • Xpath Injection
Vulnerability Name CVE
CWE
CWE Severity
File tampering
CWE-20
CWE-20 Medium
Host header attack
CWE-20
CWE-20 Medium
HTML form susceptible to spam
CWE-20
CWE-20 Medium
HTML Injection
CWE-80
CWE-80 Medium
Insecure usage of Version 1 UUID/GUID
CWE-328
CWE-328 Medium
Java object deserialization of user-supplied data
CWE-20
CWE-20 Medium
JSF ViewState client side storage
CWE-693
CWE-693 Medium
Oracle E-Business Suite Frame Injection (CVE-2017-3528) CVE-2017-3528
CWE-601
CWE-601 Medium
PHP curl_exec() url is controlled by user CVE-2009-0037
CWE-352
CWE-352 Medium
PHP mail function ASCII control character header spoofing vulnerability CVE-2002-0986
CWE-20
CWE-20 Medium
PHP object deserialization of user-supplied data
CWE-20
CWE-20 Medium
PHP preg_replace used on user input
CWE-20
CWE-20 Medium
PHP super-globals-overwrite
CWE-1108
CWE-1108 Medium
PHP unserialize() used on user input
CWE-20
CWE-20 Medium
Python object deserialization of user-supplied data
CWE-20
CWE-20 Medium
Same origin method execution (SOME)
CWE-20
CWE-20 Medium
URL rewrite vulnerability CVE-2018-14773
CWE-436
CWE-436 Medium
User-controlled form action
CWE-20
CWE-20 Medium
User controllable charset
CWE-20
CWE-20 Medium
WordPress XML-RPC authentication brute force
CWE-521
CWE-521 Medium

Still Have Questions?

Contact us any time, 24/7, and we’ll help you get the most out of Acunetix.

support@acunetix.com

Vulnerability Categories

  • Abuse Of Functionality
  • Acumonitor
  • Arbitrary File Creation
  • Arbitrary File Read
  • Arbitrary File Write
  • Authentication Bypass
  • BOLA
  • Bruteforce Possible
  • Buffer Overflow
  • CSRF
  • CSTI
  • Code Execution
  • Configuration
  • Crlf Injection
  • Deepscan
  • Default Credentials
  • Denial-of-service
  • Dev Files
  • Directory Listing
  • Directory Traversal
  • Eli Injection
  • Error Handling
  • File Inclusion
  • Http Parameter Pollution
  • Http Response Splitting
  • Information Disclosure
  • Insecure Admin Access
  • Insecure Deserialization
  • Internal Ip Disclosure
  • Known Vulnerabilitie
  • Known Vulnerabilities
  • Ldap Injection
  • Malware
  • Missing Update
  • Path Traversal
  • Privilege Escalation
  • Remote Code Execution
  • SSRF
  • SSTI
  • Sensitive Data Not Over Ssl
  • Server Side Template Injection
  • Session Fixation
  • Source Code Disclosure
  • Sql Injection
  • Test Files
  • Unauthenticated File Upload
  • Url Redirection
  • Weak Credentials
  • Weak Crypto
  • XFS
  • XSS
  • XXE
  • Xpath Injection

Severity

  • Critical
  • High
  • Medium
  • Low
  • Informational

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti