🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24302 vulnerabilities
in
62 categories
.
Critical: 1589
High: 13053
Medium: 8721
Low: 870
Information: 69
Vulnerability Name
CVE
CWE
Severity
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2025-1948)
CVE-2025-1948
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2025-5115)
CVE-2025-5115
CWE-400
High
Jetty Weak Authentication Vulnerability (CVE-2023-41900)
CVE-2023-41900
-
Medium
Jira Projects accessible anonymously
-
CWE-200
Low
Jira QueryComponent Information Disclosure (CVE-2020-14179)
CVE-2020-14179
CWE-288
Medium
JIRA Security Advisory 2012-08-28
-
CWE-79
High
JIRA Security Advisory 2013-02-21
-
CWE-22
High
JIRA Security Advisory 2014-02-26
-
CWE-22
High
Jira Seraph Authentication Bypass (CVE-2022-0540)
CVE-2022-0540
CWE-288
Critical
Jira SSTI CVE-2019-11581
CVE-2019-11581
CWE-22
High
Jira Unauthorized SSRF via REST API
CVE-2019-8451
CWE-918
High
Jira Unauthorized User Enumeration (CVE-2020-14181)
CVE-2020-14181
CWE-200
Medium
Jira Unauthorized User Enumeration via UserPickerBrowser
-
CWE-200
Low
Joe Editor DEADJOE file
-
CWE-538
Low
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-0168)
CVE-2014-0168
CWE-352
Medium
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899)
CVE-2018-10899
CWE-352
High
Jolokia Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000129)
CVE-2018-1000129
CWE-707
Medium
Jolokia XML External Entity (XXE) vulnerability
-
CWE-611
High
Joomla 1.5 end of life
-
CWE-1104
High
Joomla Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2005-4650)
CVE-2005-4650
CWE-770
Medium
Joomla Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2018-11324)
CVE-2018-11324
CWE-362
Medium
Joomla Configuration Vulnerability (CVE-2008-3228)
CVE-2008-3228
-
High
Joomla Credentials Management Errors Vulnerability (CVE-2016-9081)
CVE-2016-9081
-
Critical
Joomla Cross-Site Request Forgery (CSRF) (CVE-2021-26033)
CVE-2021-26033
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2009-1280)
CVE-2009-1280
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5397)
CVE-2015-5397
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8563)
CVE-2015-8563
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-17858)
CVE-2018-17858
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-18650)
CVE-2019-18650
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-10241)
CVE-2020-10241
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-13760)
CVE-2020-13760
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15695)
CVE-2020-15695
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15700)
CVE-2020-15700
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-35615)
CVE-2020-35615
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8419)
CVE-2020-8419
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8420)
CVE-2020-8420
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-26034)
CVE-2021-26034
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-23750)
CVE-2023-23750
CWE-352
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2008-4122)
CVE-2008-4122
-
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2011-4321)
CVE-2011-4321
-
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2014-7228)
CVE-2014-7228
-
High
Joomla CVE-2006-4469 Vulnerability (CVE-2006-4469)
CVE-2006-4469
-
High
Joomla CVE-2006-4470 Vulnerability (CVE-2006-4470)
CVE-2006-4470
-
High
Joomla CVE-2006-4472 Vulnerability (CVE-2006-4472)
CVE-2006-4472
-
High
Joomla CVE-2009-3945 Vulnerability (CVE-2009-3945)
CVE-2009-3945
-
Medium
Joomla CVE-2012-0819 Vulnerability (CVE-2012-0819)
CVE-2012-0819
-
Medium
Joomla CVE-2012-0821 Vulnerability (CVE-2012-0821)
CVE-2012-0821
-
Medium
Joomla CVE-2012-0835 Vulnerability (CVE-2012-0835)
CVE-2012-0835
-
Medium
Joomla CVE-2012-0836 Vulnerability (CVE-2012-0836)
CVE-2012-0836
-
Medium
Joomla CVE-2012-2747 Vulnerability (CVE-2012-2747)
CVE-2012-2747
-
High
Joomla CVE-2012-2748 Vulnerability (CVE-2012-2748)
CVE-2012-2748
-
Medium
Joomla CVE-2012-5827 Vulnerability (CVE-2012-5827)
CVE-2012-5827
-
Medium
Joomla CVE-2014-7229 Vulnerability (CVE-2014-7229)
CVE-2014-7229
-
Medium
Joomla CVE-2017-14595 Vulnerability (CVE-2017-14595)
CVE-2017-14595
-
Low
Joomla CVE-2017-7988 Vulnerability (CVE-2017-7988)
CVE-2017-7988
-
Medium
Joomla CVE-2018-15881 Vulnerability (CVE-2018-15881)
CVE-2018-15881
-
High
Joomla CVE-2018-17856 Vulnerability (CVE-2018-17856)
CVE-2018-17856
-
High
Joomla CVE-2018-17859 Vulnerability (CVE-2018-17859)
CVE-2018-17859
-
Medium
Joomla CVE-2019-12764 Vulnerability (CVE-2019-12764)
CVE-2019-12764
-
Medium
Joomla CVE-2019-14654 Vulnerability (CVE-2019-14654)
CVE-2019-14654
-
High
Joomla CVE-2019-15028 Vulnerability (CVE-2019-15028)
CVE-2019-15028
-
Medium
Joomla CVE-2019-7739 Vulnerability (CVE-2019-7739)
CVE-2019-7739
-
Medium
Joomla CVE-2020-35610 Vulnerability (CVE-2020-35610)
CVE-2020-35610
-
High
Joomla CVE-2021-23127 Vulnerability (CVE-2021-23127)
CVE-2021-23127
-
Critical
Joomla CVE-2021-23128 Vulnerability (CVE-2021-23128)
CVE-2021-23128
-
Critical
Joomla CVE-2021-23132 Vulnerability (CVE-2021-23132)
CVE-2021-23132
-
High
Joomla CVE-2021-26031 Vulnerability (CVE-2021-26031)
CVE-2021-26031
-
Medium
Joomla CVE-2022-23799 Vulnerability (CVE-2022-23799)
CVE-2022-23799
-
Critical
Joomla CVE-2022-27911 Vulnerability (CVE-2022-27911)
CVE-2022-27911
-
Medium
Joomla CVE-2023-40626 Vulnerability (CVE-2023-40626)
CVE-2023-40626
-
High
Joomla CVE-2025-25227 Vulnerability (CVE-2025-25227)
CVE-2025-25227
-
High
Joomla Debug Console enabled
-
CWE-200
Medium
Joomla Deserialization of Untrusted Data Vulnerability (CVE-2019-11831)
CVE-2019-11831
CWE-502
Critical
Joomla Deserialization of Untrusted Data Vulnerability (CVE-2019-7743)
CVE-2019-7743
CWE-502
Critical
Joomla Exposure of Resource to Wrong Sphere Vulnerability (CVE-2020-10238)
CVE-2020-10238
CWE-668
High
«
1
...
58
59
60
...
325
»