🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24342 vulnerabilities
in
62 categories
.
Critical: 1593
High: 13071
Medium: 8734
Low: 875
Information: 69
Vulnerability Name
CVE
CWE
Severity
WordPress Improper Authentication Vulnerability (CVE-2022-43504)
CVE-2022-43504
CWE-287
Medium
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2003-1599)
CVE-2003-1599
CWE-94
High
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2009-3890)
CVE-2009-3890
CWE-94
Medium
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-4338)
CVE-2013-4338
CWE-94
High
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-8942)
CVE-2019-8942
CWE-94
High
WordPress Improper Input Validation Vulnerability (CVE-2007-1277)
CVE-2007-1277
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2008-2392)
CVE-2008-2392
CWE-20
Critical
WordPress Improper Input Validation Vulnerability (CVE-2008-4106)
CVE-2008-4106
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2008-5695)
CVE-2008-5695
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2009-2431)
CVE-2009-2431
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2011-3127)
CVE-2011-3127
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2011-4957)
CVE-2011-4957
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2013-2204)
CVE-2013-2204
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2013-4339)
CVE-2013-4339
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2013-5738)
CVE-2013-5738
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2014-9038)
CVE-2014-9038
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2016-9263)
CVE-2016-9263
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2017-1000600)
CVE-2017-1000600
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2017-6815)
CVE-2017-6815
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2017-9065)
CVE-2017-9065
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2018-1000773)
CVE-2018-1000773
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2018-20152)
CVE-2018-20152
CWE-20
Medium
WordPress Improper Input Validation Vulnerability (CVE-2019-20041)
CVE-2019-20041
CWE-20
Critical
WordPress Improper Input Validation Vulnerability (CVE-2020-26596)
CVE-2020-26596
CWE-20
High
WordPress Improper Input Validation Vulnerability (CVE-2020-28037)
CVE-2020-28037
CWE-20
Critical
WordPress Improper Input Validation Vulnerability (CVE-2020-35539)
CVE-2020-35539
CWE-20
Critical
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0194)
CVE-2008-0194
CWE-22
High
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0196)
CVE-2008-0196
CWE-22
Medium
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0615)
CVE-2008-0615
CWE-22
Medium
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-4769)
CVE-2008-4769
CWE-22
Critical
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-6896)
CVE-2016-6896
CWE-22
High
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-7169)
CVE-2016-7169
CWE-22
Medium
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-14719)
CVE-2017-14719
CWE-22
High
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-14722)
CVE-2017-14722
CWE-22
High
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-12895)
CVE-2018-12895
CWE-22
High
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-8943)
CVE-2019-8943
CWE-22
Medium
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2023-2745)
CVE-2023-2745
CWE-22
Medium
WordPress Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-6762)
CVE-2008-6762
CWE-59
Medium
WordPress Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') Vulnerability (CVE-2016-10033)
CVE-2016-10033
CWE-707
Critical
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-1732)
CVE-2007-1732
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-4139)
CVE-2007-4139
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-5105)
CVE-2007-5105
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-5106)
CVE-2007-5106
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-5710)
CVE-2007-5710
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2007-6677)
CVE-2007-6677
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-0192)
CVE-2008-0192
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-0193)
CVE-2008-0193
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-0617)
CVE-2008-0617
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-0618)
CVE-2008-0618
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-1304)
CVE-2008-1304
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2068)
CVE-2008-2068
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3233)
CVE-2008-3233
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-5278)
CVE-2008-5278
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-2851)
CVE-2009-2851
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-3891)
CVE-2009-3891
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-4536)
CVE-2010-4536
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-5294)
CVE-2010-5294
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-5295)
CVE-2010-5295
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-0700)
CVE-2011-0700
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4956)
CVE-2011-4956
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-0287)
CVE-2012-0287
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-0782)
CVE-2012-0782
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-2403)
CVE-2012-2403
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-2404)
CVE-2012-2404
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-3414)
CVE-2012-3414
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-6633)
CVE-2012-6633
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-0236)
CVE-2013-0236
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-0237)
CVE-2013-0237
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-2201)
CVE-2013-2201
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-5739)
CVE-2013-5739
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-5240)
CVE-2014-5240
CWE-707
Low
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-9031)
CVE-2014-9031
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-9032)
CVE-2014-9032
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-9035)
CVE-2014-9035
CWE-707
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2014-9036)
CVE-2014-9036
CWE-707
Medium
«
1
...
211
212
213
...
325
»