🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24342 vulnerabilities
in
62 categories
.
Critical: 1593
High: 13071
Medium: 8734
Low: 875
Information: 69
Vulnerability Name
CVE
CWE
Severity
MySQL Improper Access Control Vulnerability (CVE-2016-8288)
CVE-2016-8288
CWE-284
Low
MySQL Improper Access Control Vulnerability (CVE-2025-50081)
CVE-2025-50081
CWE-284
Low
MySQL Improper Authentication Vulnerability (CVE-2012-2122)
CVE-2012-2122
CWE-287
Medium
MySQL Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2005-0709)
CVE-2005-0709
CWE-94
Medium
MySQL Improper Initialization Vulnerability (CVE-2020-11655)
CVE-2020-11655
CWE-665
High
MySQL Improper Input Validation Vulnerability (CVE-2006-4227)
CVE-2006-4227
CWE-20
Medium
MySQL Improper Input Validation Vulnerability (CVE-2009-4028)
CVE-2009-4028
CWE-20
Medium
MySQL Improper Input Validation Vulnerability (CVE-2012-5614)
CVE-2012-5614
CWE-20
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3256)
CVE-2017-3256
CWE-20
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3258)
CVE-2017-3258
CWE-20
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3273)
CVE-2017-3273
CWE-20
Medium
MySQL Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2010-1848)
CVE-2010-1848
CWE-22
Medium
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2005-0004)
CVE-2005-0004
CWE-59
Medium
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-4098)
CVE-2008-4098
CWE-59
Medium
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-7247)
CVE-2008-7247
CWE-59
Medium
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2009-4030)
CVE-2009-4030
CWE-59
Medium
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2016-6664)
CVE-2016-6664
CWE-59
High
MySQL Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-4456)
CVE-2008-4456
CWE-707
Low
MySQL Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5398)
CVE-2020-5398
CWE-707
High
MySQL Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')Vulnerability (CVE-2020-5258)
CVE-2020-5258
CWE-138
High
MySQL Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2010-2008)
CVE-2010-2008
CWE-138
Low
MySQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-5026)
CVE-2009-5026
CWE-138
Medium
MySQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-4414)
CVE-2012-4414
CWE-138
Medium
MySQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-0375)
CVE-2013-0375
CWE-138
Medium
MySQL Improper Privilege Management Vulnerability (CVE-2017-3257)
CVE-2017-3257
CWE-269
Medium
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2004-0836)
CVE-2004-0836
CWE-119
Critical
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-0226)
CVE-2008-0226
CWE-119
High
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2010-1850)
CVE-2010-1850
CWE-119
Medium
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-0553)
CVE-2012-0553
CWE-119
High
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-0882)
CVE-2012-0882
CWE-119
High
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-2102)
CVE-2012-2102
CWE-119
Low
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-5611)
CVE-2012-5611
CWE-119
Medium
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-5612)
CVE-2012-5612
CWE-119
Medium
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-1492)
CVE-2013-1492
CWE-119
High
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-1861)
CVE-2013-1861
CWE-119
Medium
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-0001)
CVE-2014-0001
CWE-119
High
MySQL Improper Validation of Array Index Vulnerability (CVE-2022-21310)
CVE-2022-21310
CWE-129
Medium
MySQL Incorrect Authorization Vulnerability (CVE-2025-50084)
CVE-2025-50084
CWE-863
Medium
MySQL Incorrect Authorization Vulnerability (CVE-2025-50085)
CVE-2025-50085
CWE-863
Medium
MySQL Incorrect Authorization Vulnerability (CVE-2025-50086)
CVE-2025-50086
CWE-863
Medium
MySQL Insufficiently Protected Credentials Vulnerability (CVE-2012-5627)
CVE-2012-5627
CWE-522
Medium
MySQL Integer Overflow or Wraparound Vulnerability (CVE-2017-3599)
CVE-2017-3599
CWE-190
High
MySQL NULL Pointer Dereference Vulnerability (CVE-2020-1967)
CVE-2020-1967
CWE-476
High
MySQL NULL Pointer Dereference Vulnerability (CVE-2020-1971)
CVE-2020-1971
CWE-476
Medium
MySQL NULL Pointer Dereference Vulnerability (CVE-2021-22570)
CVE-2021-22570
CWE-476
Medium
MySQL Numeric Errors Vulnerability (CVE-2006-3486)
CVE-2006-3486
-
Low
MySQL Numeric Errors Vulnerability (CVE-2007-2583)
CVE-2007-2583
-
Medium
MySQL Numeric Errors Vulnerability (CVE-2010-3835)
CVE-2010-3835
-
Medium
MySQL Numeric Errors Vulnerability (CVE-2016-2105)
CVE-2016-2105
-
High
MySQL Observable Discrepancy Vulnerability (CVE-2019-1559)
CVE-2019-1559
CWE-203
Medium
MySQL Other Vulnerability (CVE-1999-1188)
CVE-1999-1188
-
Medium
MySQL Other Vulnerability (CVE-2000-0045)
CVE-2000-0045
-
Medium
MySQL Other Vulnerability (CVE-2000-0148)
CVE-2000-0148
-
High
MySQL Other Vulnerability (CVE-2000-0981)
CVE-2000-0981
-
High
MySQL Other Vulnerability (CVE-2001-0407)
CVE-2001-0407
-
Medium
MySQL Other Vulnerability (CVE-2001-1255)
CVE-2001-1255
-
Medium
MySQL Other Vulnerability (CVE-2001-1274)
CVE-2001-1274
-
High
MySQL Other Vulnerability (CVE-2001-1275)
CVE-2001-1275
-
High
MySQL Other Vulnerability (CVE-2001-1453)
CVE-2001-1453
-
High
MySQL Other Vulnerability (CVE-2001-1454)
CVE-2001-1454
-
High
MySQL Other Vulnerability (CVE-2002-0969)
CVE-2002-0969
-
Medium
MySQL Other Vulnerability (CVE-2002-1373)
CVE-2002-1373
-
Medium
MySQL Other Vulnerability (CVE-2002-1374)
CVE-2002-1374
-
High
MySQL Other Vulnerability (CVE-2002-1375)
CVE-2002-1375
-
High
MySQL Other Vulnerability (CVE-2002-1376)
CVE-2002-1376
-
High
MySQL Other Vulnerability (CVE-2002-1809)
CVE-2002-1809
-
High
MySQL Other Vulnerability (CVE-2002-1921)
CVE-2002-1921
-
High
MySQL Other Vulnerability (CVE-2002-1923)
CVE-2002-1923
-
High
MySQL Other Vulnerability (CVE-2003-0073)
CVE-2003-0073
-
Medium
MySQL Other Vulnerability (CVE-2003-0150)
CVE-2003-0150
-
Critical
MySQL Other Vulnerability (CVE-2003-0780)
CVE-2003-0780
-
Critical
MySQL Other Vulnerability (CVE-2004-0381)
CVE-2004-0381
-
Low
MySQL Other Vulnerability (CVE-2004-0388)
CVE-2004-0388
-
Low
MySQL Other Vulnerability (CVE-2004-0457)
CVE-2004-0457
-
Medium
MySQL Other Vulnerability (CVE-2004-0835)
CVE-2004-0835
-
High
«
1
...
114
115
116
...
325
»