Resources

Vulnerability & Exploit Database

This is the list of vulnerabilities you can detect with Pentest-Tools.com and the exploits currently available in the platform.

We detect more than 14.612 vulnerabilities with multiple tools (Network Scanner, Website Scanner, Wordpress Scanner, and more) and we also have 155 exploit modules in Sniper to validate the risk level of critical CVEs.

Display

Displaying 1 - 25 results out of 79

Pentest-Tools.com Vulnerabilities
Name
Detectable with
Detection added
Severity
Exploitable
with Sniper
Ruby Insecure DeserializationWebsite Scanner

High

No
MisconfigurationsWebsite Scanner

Low

No
Python Insecure DeserializationWebsite Scanner

High

No
PHP Insecure DeserializationWebsite Scanner

High

No
.NET Insecure DeserializationWebsite Scanner

High

No
Session Token in URLWebsite Scanner

Low

No
Password Returned in Later ResponseWebsite Scanner

Medium

No
SQL Statement in Request ParameterWebsite Scanner

Low

No
HTTP/2 Request SmugglingWebsite Scanner

High

No
JWT None AlgorithmWebsite Scanner

High

No
JWT Weak Secret KeyWebsite Scanner

High

No
JWT Unverified SignatureWebsite Scanner

High

No
JWT Algorithm ConfusionWebsite Scanner

High

No
JWT weaknessWebsite Scanner

High

No
Password Submitted in URLWebsite Scanner

Low

No
DOM-based Cross-Site ScriptingWebsite Scanner

High

No
Enumerable ParameterWebsite Scanner

Low

No
Session FixationWebsite Scanner

Medium

No
NoSQL InjectionWebsite Scanner

High

No
Unsafe security header: Content-Security-PolicyWebsite Scanner

Low

No
Java Insecure DeserializationWebsite Scanner

High

No
Server-Side Template InjectionWebsite Scanner

High

No
Cross-Site Request ForgeryWebsite Scanner

Low

No
Serialized Objects in HTTP requestWebsite Scanner

Low

No
XML External Entity InjectionWebsite Scanner

High

No