Vulnerability Name CVE Severity
Apache mod_negotiation filename bruteforcing
Apache Solr endpoint
Apache stronghold-info enabled
Apache stronghold-status enabled
Arbitrary File Read on Nuxt.js Development Server
ASP.NET debugging enabled
ASP.NET ViewStateUserKey Is Not Set
Broken Link Hijacking
Clickjacking: CSP frame-ancestors missing
ColdFusion administrator login page publicly available
ColdFusion RDS Service enabled
Cookies Not Marked as HttpOnly
Cookies Not Marked as Secure
Cookies with missing, inconsistent or contradictory properties
Error page path disclosure
FrontPage Identified
Gitlab user disclosure
H2 console publicly accessible
Internet Information Server returns IP address in HTTP header (Content-Location)
Jenkins open people list
Kentico Staging API publicly accessible
Missing Content-Type Header
Nuxt.js Running in Development Mode
OData feed accessible anonymously
Passive Mixed Content over HTTPS
PHP allow_url_fopen Is Enabled
PHP allow_url_include Is Enabled
PHP display_errors Is Enabled
PHP open_basedir Is Not Configured
Sensitive pages could be cached
Session cookies scoped to parent domain
Session ID in URL
Spring Boot Misconfiguration: Spring Boot Actuator shutdown endpoint is web exposed
Symfony ESI (Edge-Side Includes) enabled
Tomcat status page
TRACE/TRACK Method Detected
TRACK method is enabled
Unrestricted access to a monitoring system
Unrestricted access to ImageResizer Diagnotics plugin
Unrestricted access to Prometheus
Unrestricted access to Prometheus Metrics
WordPress admin accessible without HTTP authentication
WordPress default administrator account