🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24342 vulnerabilities
in
62 categories
.
Critical: 1593
High: 13071
Medium: 8734
Low: 875
Information: 69
Vulnerability Name
CVE
CWE
Severity
MySQL Other Vulnerability (CVE-2004-0837)
CVE-2004-0837
-
Low
MySQL Other Vulnerability (CVE-2004-0956)
CVE-2004-0956
-
Medium
MySQL Other Vulnerability (CVE-2004-2149)
CVE-2004-2149
-
Medium
MySQL Other Vulnerability (CVE-2005-0710)
CVE-2005-0710
-
Medium
MySQL Other Vulnerability (CVE-2005-0711)
CVE-2005-0711
-
Low
MySQL Other Vulnerability (CVE-2005-0799)
CVE-2005-0799
-
Medium
MySQL Other Vulnerability (CVE-2005-1636)
CVE-2005-1636
-
Medium
MySQL Other Vulnerability (CVE-2005-2558)
CVE-2005-2558
-
Medium
MySQL Other Vulnerability (CVE-2005-2572)
CVE-2005-2572
-
High
MySQL Other Vulnerability (CVE-2005-2573)
CVE-2005-2573
-
Medium
MySQL Other Vulnerability (CVE-2006-0903)
CVE-2006-0903
-
Medium
MySQL Other Vulnerability (CVE-2006-1516)
CVE-2006-1516
-
Medium
MySQL Other Vulnerability (CVE-2006-1517)
CVE-2006-1517
-
Medium
MySQL Other Vulnerability (CVE-2006-1518)
CVE-2006-1518
-
Medium
MySQL Other Vulnerability (CVE-2006-2753)
CVE-2006-2753
-
High
MySQL Other Vulnerability (CVE-2006-3081)
CVE-2006-3081
-
Medium
MySQL Other Vulnerability (CVE-2006-4031)
CVE-2006-4031
-
Low
MySQL Other Vulnerability (CVE-2006-4226)
CVE-2006-4226
-
Low
MySQL Other Vulnerability (CVE-2007-1420)
CVE-2007-1420
-
Low
MySQL Other Vulnerability (CVE-2007-2692)
CVE-2007-2692
-
Medium
MySQL Other Vulnerability (CVE-2007-2693)
CVE-2007-2693
-
Low
MySQL Other Vulnerability (CVE-2007-5970)
CVE-2007-5970
-
Medium
MySQL Other Vulnerability (CVE-2007-6303)
CVE-2007-6303
-
Low
MySQL Other Vulnerability (CVE-2007-6304)
CVE-2007-6304
-
Medium
MySQL Other Vulnerability (CVE-2009-0819)
CVE-2009-0819
-
Medium
MySQL Other Vulnerability (CVE-2009-4019)
CVE-2009-4019
-
Medium
MySQL Other Vulnerability (CVE-2010-1849)
CVE-2010-1849
-
Medium
MySQL Other Vulnerability (CVE-2010-3676)
CVE-2010-3676
-
Medium
MySQL Other Vulnerability (CVE-2010-3680)
CVE-2010-3680
-
Medium
MySQL Other Vulnerability (CVE-2010-3681)
CVE-2010-3681
-
Medium
MySQL Other Vulnerability (CVE-2010-3682)
CVE-2010-3682
-
Medium
MySQL Other Vulnerability (CVE-2010-3683)
CVE-2010-3683
-
Medium
MySQL Other Vulnerability (CVE-2010-3838)
CVE-2010-3838
-
Medium
MySQL Other Vulnerability (CVE-2010-3839)
CVE-2010-3839
-
Medium
MySQL Other Vulnerability (CVE-2010-3840)
CVE-2010-3840
-
Medium
MySQL Other Vulnerability (CVE-2012-5383)
CVE-2012-5383
-
Medium
MySQL Other Vulnerability (CVE-2016-0705)
CVE-2016-0705
-
Critical
MySQL Out-of-bounds Write Vulnerability (CVE-2009-4484)
CVE-2009-4484
CWE-787
High
MySQL Out-of-bounds Write Vulnerability (CVE-2020-15358)
CVE-2020-15358
CWE-787
Medium
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2079)
CVE-2008-2079
CWE-264
Medium
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-4097)
CVE-2008-4097
CWE-264
Medium
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1626)
CVE-2010-1626
CWE-264
Low
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4452)
CVE-2012-4452
CWE-264
Low
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-6662)
CVE-2016-6662
CWE-264
Critical
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8289)
CVE-2016-8289
CWE-264
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3677)
CVE-2010-3677
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3678)
CVE-2010-3678
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3679)
CVE-2010-3679
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3833)
CVE-2010-3833
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3836)
CVE-2010-3836
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3837)
CVE-2010-3837
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2012-2749)
CVE-2012-2749
-
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2020-11080)
CVE-2020-11080
CWE-400
High
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50076)
CVE-2025-50076
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50077)
CVE-2025-50077
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50078)
CVE-2025-50078
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50079)
CVE-2025-50079
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50080)
CVE-2025-50080
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50082)
CVE-2025-50082
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50088)
CVE-2025-50088
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50089)
CVE-2025-50089
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50091)
CVE-2025-50091
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50092)
CVE-2025-50092
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50093)
CVE-2025-50093
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50094)
CVE-2025-50094
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50095)
CVE-2025-50095
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50096)
CVE-2025-50096
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50097)
CVE-2025-50097
CWE-400
Medium
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2025-50104)
CVE-2025-50104
CWE-400
Low
MySQL Use After Free Vulnerability (CVE-2017-3302)
CVE-2017-3302
CWE-416
High
MySQL Use After Free Vulnerability (CVE-2019-7317)
CVE-2019-7317
CWE-416
Medium
MySQL Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-0735)
CVE-2018-0735
CWE-327
Medium
MySQL Use of Externally-Controlled Format String Vulnerability (CVE-2006-3469)
CVE-2006-3469
CWE-134
Medium
MySQL Use of Externally-Controlled Format String Vulnerability (CVE-2008-3963)
CVE-2008-3963
CWE-134
Medium
MySQL Use of Externally-Controlled Format String Vulnerability (CVE-2009-2446)
CVE-2009-2446
CWE-134
High
«
1
...
115
116
117
...
325
»