
February 2026 Product Notes: New Test Catalogue & API Scanning experience
Security is often a game of “you don’t know what you don’t know.” At Detectify, we focus on removing that uncertainty. Whether it’s reaching 922 …

Detectify

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users.
The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers. We added these tests to the Detectify scanner from December 28 – January 8.
The Solar Winds Orion API is vulnerable to authentication bypass that could allow a remote attacker to execute API commands.
Apache Flink is vulnerable to a path traversal vulnerability in JobManager. An unauthenticated attacker can read system files on the server.
FortiWeb versions 6.3.7 (or earlier) and 6.2.3 (or earlier) are vulnerable to a blind SQL injection in the user interface of FortiWeb.
Ruby on rails versions 6.0.0 to 6.0.3.2 are vulnerable to an open redirect issue because the request parameter “location” was not validated.
The JD Edwards EnterpriseOne Application Interface Services (AIS) Server is vulnerable to an SSRF vulnerability.
The issue navigator in Atlassian Jira is vulnerable to prototype pollution which can be pivoted to an XSS.

Security is often a game of “you don’t know what you don’t know.” At Detectify, we focus on removing that uncertainty. Whether it’s reaching 922 …

Most tools will just tell you that a port is open. We’ve decided that’s not enough. TLDR: We’ve launched Protocol Discovery, a custom-built engine designed …