🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24302 vulnerabilities
in
62 categories
.
Critical: 1589
High: 13053
Medium: 8721
Low: 870
Information: 69
Vulnerability Name
CVE
CWE
Severity
Jenkins Improper Access Control Vulnerability (CVE-2015-5325)
CVE-2015-5325
CWE-284
High
Jenkins Improper Authentication Vulnerability (CVE-2014-2062)
CVE-2014-2062
CWE-287
Medium
Jenkins Improper Authentication Vulnerability (CVE-2014-2066)
CVE-2014-2066
CWE-287
Medium
Jenkins Improper Authentication Vulnerability (CVE-2017-1000354)
CVE-2017-1000354
CWE-287
High
Jenkins Improper Authentication Vulnerability (CVE-2017-2604)
CVE-2017-2604
CWE-287
Medium
Jenkins Improper Authentication Vulnerability (CVE-2018-1999045)
CVE-2018-1999045
CWE-287
Medium
Jenkins Improper Authorization Vulnerability (CVE-2021-21693)
CVE-2021-21693
CWE-285
Critical
Jenkins Improper Certificate Validation Vulnerability (CVE-2017-1000396)
CVE-2017-1000396
CWE-295
Medium
Jenkins Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2024-43044)
CVE-2024-43044
CWE-754
High
Jenkins Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-3666)
CVE-2014-3666
CWE-94
High
Jenkins Improper Handling of Inconsistent Structural Elements Vulnerability (CVE-2021-21640)
CVE-2021-21640
CWE-240
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2012-4438)
CVE-2012-4438
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2012-6072)
CVE-2012-6072
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2012-6073)
CVE-2012-6073
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2013-0331)
CVE-2013-0331
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2015-1808)
CVE-2015-1808
CWE-20
Low
Jenkins Improper Input Validation Vulnerability (CVE-2016-0789)
CVE-2016-0789
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2016-0792)
CVE-2016-0792
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000391)
CVE-2017-1000391
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000394)
CVE-2017-1000394
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000401)
CVE-2017-1000401
CWE-20
Low
Jenkins Improper Input Validation Vulnerability (CVE-2018-1000068)
CVE-2018-1000068
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999001)
CVE-2018-1999001
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999002)
CVE-2018-1999002
CWE-20
High
Jenkins Improper Input Validation Vulnerability (CVE-2021-21606)
CVE-2021-21606
CWE-20
Medium
Jenkins Improper Input Validation Vulnerability (CVE-2021-21639)
CVE-2021-21639
CWE-20
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2014-2059)
CVE-2014-2059
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2014-3664)
CVE-2014-3664
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-1807)
CVE-2015-1807
CWE-22
Low
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-5322)
CVE-2015-5322
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000194)
CVE-2018-1000194
CWE-22
High
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000406)
CVE-2018-1000406
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000863)
CVE-2018-1000863
CWE-22
High
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000997)
CVE-2018-1000997
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-6356)
CVE-2018-6356
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-10352)
CVE-2019-10352
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21605)
CVE-2021-21605
CWE-22
High
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21683)
CVE-2021-21683
CWE-22
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21690)
CVE-2021-21690
CWE-22
Critical
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21692)
CVE-2021-21692
CWE-22
Critical
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2024-23897)
CVE-2024-23897
CWE-22
Critical
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21602)
CVE-2021-21602
CWE-59
Medium
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21686)
CVE-2021-21686
CWE-59
High
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21691)
CVE-2021-21691
CWE-59
Critical
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2026-33001)
CVE-2026-33001
CWE-59
High
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4344)
CVE-2011-4344
CWE-707
Low
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-0324)
CVE-2012-0324
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-0325)
CVE-2012-0325
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-4439)
CVE-2012-4439
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-4440)
CVE-2012-4440
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-4441)
CVE-2012-4441
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-6074)
CVE-2012-6074
CWE-707
Low
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-2033)
CVE-2013-2033
CWE-707
Low
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-5573)
CVE-2013-5573
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-2065)
CVE-2014-2065
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-2067)
CVE-2014-2067
CWE-707
Low
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-3681)
CVE-2014-3681
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-1812)
CVE-2015-1812
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-1813)
CVE-2015-1813
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5326)
CVE-2015-5326
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-7536)
CVE-2015-7536
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-1000392)
CVE-2017-1000392
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-17383)
CVE-2017-17383
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-2601)
CVE-2017-2601
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-2607)
CVE-2017-2607
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-2610)
CVE-2017-2610
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000170)
CVE-2018-1000170
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000407)
CVE-2018-1000407
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1999005)
CVE-2018-1999005
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1999007)
CVE-2018-1999007
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-1003050)
CVE-2019-1003050
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-10383)
CVE-2019-10383
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-10401)
CVE-2019-10401
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-10402)
CVE-2019-10402
CWE-707
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-10403)
CVE-2019-10403
CWE-707
Medium
«
1
...
55
56
57
...
325
»