📄️ The issue lifecycle
Understand how security issues progress through different states in Invicti Enterprise and Invicti Standard, from detection to assignment, fixing, and confirmation.
📄️ View issues in Invicti Enterprise
Access and manage security vulnerabilities detected in Invicti Enterprise scans using the Issues section's four pages. To do, Waiting for retest, Addressed issues, and All issues.
📄️ View issues in Invicti Standard
View and manage detected issues in Invicti Standard, including accessing them from the Scan Summary Dashboard, using the Issues panel options, and viewing issue details or browser previews
📄️ Vulnerability severity levels
Understand how Invicti categorizes vulnerabilities using severity levels from Critical to Information Alerts to help prioritize security fixes.
📄️ View the HTTP request and response of an issue
View HTTP request and response information for detected security issues to verify vulnerabilities in Invicti Enterprise and Invicti Standard.
📄️ How Invicti approaches FIPS
Understand how Invicti is compatible with FIPS 140-2 standards and can function on machines where FIPS policy is enabled.
📄️ How Invicti Hawk finds vulnerabilities
Invicti Hawk is the infrastructure used to detect Server Side Request Forgery (SSRF), blind, asynchronous and second order vulnerabilities through out-of-band channels.