🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Runtime SCA Findings
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.130426185443
Medium Severity Vulnerabilities
Found
15365 vulnerabilities
at
Medium
severity.
Reference
Title
Technology
CVE-2019-2482
MySQL Vulnerability
MySQL
CVE-2019-2481
MySQL Vulnerability
MySQL
CVE-2019-2455
MySQL Vulnerability
MySQL
CVE-2019-2436
MySQL Vulnerability
MySQL
CVE-2019-2434
MySQL Vulnerability
MySQL
CVE-2019-2420
MySQL Vulnerability
MySQL
CVE-2018-0735
MySQL Use of a Broken or Risky Cryptographic Algorithm Vulnerability
MySQL
CVE-2018-3286
MySQL Vulnerability
MySQL
CVE-2018-3285
MySQL Vulnerability
MySQL
CVE-2018-3283
MySQL Vulnerability
MySQL
CVE-2018-3282
MySQL Vulnerability
MySQL
CVE-2018-3280
MySQL Vulnerability
MySQL
CVE-2018-3279
MySQL Vulnerability
MySQL
CVE-2018-3278
MySQL Vulnerability
MySQL
CVE-2018-3277
MySQL Vulnerability
MySQL
CVE-2018-3276
MySQL Vulnerability
MySQL
CVE-2018-3251
MySQL Vulnerability
MySQL
CVE-2018-3247
MySQL Vulnerability
MySQL
CVE-2018-3212
MySQL Vulnerability
MySQL
CVE-2018-3203
MySQL Vulnerability
MySQL
CVE-2018-3200
MySQL Vulnerability
MySQL
CVE-2018-3195
MySQL Vulnerability
MySQL
CVE-2018-3187
MySQL Vulnerability
MySQL
CVE-2018-3186
MySQL Vulnerability
MySQL
CVE-2018-3185
MySQL Vulnerability
MySQL
CVE-2018-3182
MySQL Vulnerability
MySQL
CVE-2018-3173
MySQL Vulnerability
MySQL
CVE-2018-3171
MySQL Vulnerability
MySQL
CVE-2018-3170
MySQL Vulnerability
MySQL
CVE-2018-3162
MySQL Vulnerability
MySQL
« Previous
1
...
18
19
20
21
22
23
24
25
...
513
Next »