🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.3.2229
Web Application Vulnerabilities
This page lists
24119 vulnerabilities
in
70 categories
.
Critical: 1560
High: 12984
Medium: 8644
Low: 865
Information: 66
Vulnerability Name
CVE
CWE
Severity
Django Incorrect Default Permissions Vulnerability (CVE-2020-24583)
CVE-2020-24583
CWE-276
High
Django Incorrect Default Permissions Vulnerability (CVE-2020-24584)
CVE-2020-24584
CWE-276
High
Django Incorrect Regular Expression Vulnerability (CVE-2018-7536)
CVE-2018-7536
CWE-185
Medium
Django Incorrect Regular Expression Vulnerability (CVE-2018-7537)
CVE-2018-7537
CWE-185
Medium
Django Inefficient Algorithmic Complexity Vulnerability (CVE-2025-14550)
CVE-2025-14550
CWE-407
High
Django Inefficient Algorithmic Complexity Vulnerability (CVE-2025-64458)
CVE-2025-64458
CWE-407
High
Django Inefficient Algorithmic Complexity Vulnerability (CVE-2025-64460)
CVE-2025-64460
CWE-407
High
Django Inefficient Algorithmic Complexity Vulnerability (CVE-2026-1285)
CVE-2026-1285
CWE-407
High
Django Inefficient Regular Expression Complexity Vulnerability (CVE-2023-36053)
CVE-2023-36053
CWE-1333
High
Django Inefficient Regular Expression Complexity Vulnerability (CVE-2024-27351)
CVE-2024-27351
CWE-1333
Medium
Django Insufficiently Protected Credentials Vulnerability (CVE-2018-16984)
CVE-2018-16984
CWE-522
Medium
Django Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2022-23833)
CVE-2022-23833
CWE-835
High
Django Numeric Errors Vulnerability (CVE-2013-0306)
CVE-2013-0306
-
Medium
Django Observable Timing Discrepancy Vulnerability (CVE-2024-39329)
CVE-2024-39329
CWE-208
Medium
Django Observable Timing Discrepancy Vulnerability (CVE-2025-13473)
CVE-2025-13473
CWE-208
Medium
Django Other Vulnerability (CVE-2009-3695)
CVE-2009-3695
-
Medium
Django Other Vulnerability (CVE-2015-3982)
CVE-2015-3982
-
Medium
Django Other Vulnerability (CVE-2022-41323)
CVE-2022-41323
-
High
Django Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-4534)
CVE-2010-4534
CWE-264
Medium
Django Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0473)
CVE-2014-0473
CWE-264
Medium
Django Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0483)
CVE-2014-0483
CWE-264
Low
Django Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-9014)
CVE-2016-9014
CWE-264
High
Django Relative Path Traversal Vulnerability (CVE-2025-59682)
CVE-2025-59682
CWE-23
Medium
Django Resource Management Errors Vulnerability (CVE-2011-4137)
CVE-2011-4137
-
Medium
Django Resource Management Errors Vulnerability (CVE-2014-0474)
CVE-2014-0474
-
Critical
Django Resource Management Errors Vulnerability (CVE-2014-0481)
CVE-2014-0481
-
Medium
Django Resource Management Errors Vulnerability (CVE-2015-0221)
CVE-2015-0221
-
Medium
Django Resource Management Errors Vulnerability (CVE-2015-2316)
CVE-2015-2316
-
Medium
Django Resource Management Errors Vulnerability (CVE-2015-5143)
CVE-2015-5143
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5145)
CVE-2015-5145
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5963)
CVE-2015-5963
-
Medium
Django Resource Management Errors Vulnerability (CVE-2015-5964)
CVE-2015-5964
-
Medium
Django Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-33571)
CVE-2021-33571
CWE-918
High
Django SQL Injection via _connector parameter (CVE-2025-64459)
CVE-2025-64459
CWE-89
Critical
Django Uncontrolled Recursion Vulnerability (CVE-2019-14235)
CVE-2019-14235
CWE-674
High
Django Uncontrolled Resource Consumption Vulnerability (CVE-2019-14232)
CVE-2019-14232
CWE-400
High
Django Uncontrolled Resource Consumption Vulnerability (CVE-2019-14233)
CVE-2019-14233
CWE-400
High
Django Uncontrolled Resource Consumption Vulnerability (CVE-2021-45115)
CVE-2021-45115
CWE-400
High
Django Uncontrolled Resource Consumption Vulnerability (CVE-2023-24580)
CVE-2023-24580
CWE-400
High
Django Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2021-31542)
CVE-2021-31542
CWE-434
High
Django URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2017-7233)
CVE-2017-7233
CWE-601
Medium
Django URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2017-7234)
CVE-2017-7234
CWE-601
Medium
Django URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2018-14574)
CVE-2018-14574
CWE-601
Medium
Django Use of Hard-coded Credentials Vulnerability (CVE-2016-9013)
CVE-2016-9013
CWE-798
Critical
Django Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2019-19844)
CVE-2019-19844
CWE-640
Critical
Django weak secret key
-
CWE-693
Medium
DNN (DotNetNuke) CMS Cookie Deserialization RCE CVE-2017-9822
CVE-2017-9822
CWE-502
High
Docker Engine API is accessible without authentication
-
CWE-287
High
Docker Registry API is accessible without authentication
-
CWE-287
High
Documentation files
-
CWE-538
Low
Dojo Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Vulnerability (CVE-2020-5258)
CVE-2020-5258
CWE-1321
High
Dojo Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Vulnerability (CVE-2021-23450)
CVE-2021-23450
CWE-1321
Critical
Dolibarr Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2021-3991)
CVE-2021-3991
CWE-639
Medium
Dolibarr Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-1010054)
CVE-2019-1010054
CWE-352
High
Dolibarr Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-11825)
CVE-2020-11825
CWE-352
High
Dolibarr Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2024-31503)
CVE-2024-31503
CWE-352
High
Dolibarr CVE-2019-11200 Vulnerability (CVE-2019-11200)
CVE-2019-11200
-
High
Dolibarr CVE-2023-38886 Vulnerability (CVE-2023-38886)
CVE-2023-38886
-
High
Dolibarr Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-14240)
CVE-2017-14240
CWE-200
High
Dolibarr Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-17898)
CVE-2017-17898
CWE-200
High
Dolibarr Files or Directories Accessible to External Parties Vulnerability (CVE-2023-33568)
CVE-2023-33568
CWE-552
High
Dolibarr Improper Authentication Vulnerability (CVE-2017-8879)
CVE-2017-8879
CWE-287
Medium
Dolibarr Improper Authentication Vulnerability (CVE-2020-7995)
CVE-2020-7995
CWE-287
Critical
Dolibarr Improper Authentication Vulnerability (CVE-2021-25956)
CVE-2021-25956
CWE-287
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-11201)
CVE-2019-11201
CWE-94
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-33816)
CVE-2021-33816
CWE-94
Critical
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-0819)
CVE-2022-0819
CWE-94
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2024-29477)
CVE-2024-29477
CWE-94
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2024-37821)
CVE-2024-37821
CWE-94
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2025-56588)
CVE-2025-56588
CWE-94
High
Dolibarr Improper Input Validation Vulnerability (CVE-2013-2093)
CVE-2013-2093
CWE-20
Critical
Dolibarr Improper Input Validation Vulnerability (CVE-2022-0174)
CVE-2022-0174
CWE-20
Medium
Dolibarr Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4329)
CVE-2011-4329
CWE-707
Medium
Dolibarr Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4814)
CVE-2011-4814
CWE-707
Medium
Dolibarr Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-2092)
CVE-2013-2092
CWE-707
Medium
«
1
...
25
26
27
...
322
»