🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24302 vulnerabilities
in
62 categories
.
Critical: 1589
High: 13053
Medium: 8721
Low: 870
Information: 69
Vulnerability Name
CVE
CWE
Severity
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1428)
CVE-2010-1428
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1429)
CVE-2010-1429
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1484)
CVE-2011-1484
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2196)
CVE-2011-2196
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4605)
CVE-2011-4605
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4608)
CVE-2011-4608
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1154)
CVE-2012-1154
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1167)
CVE-2012-1167
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3369)
CVE-2012-3369
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3370)
CVE-2012-3370
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3427)
CVE-2012-3427
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4549)
CVE-2012-4549
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4550)
CVE-2012-4550
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4572)
CVE-2012-4572
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5478)
CVE-2012-5478
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5629)
CVE-2012-5629
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2133)
CVE-2013-2133
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2165)
CVE-2013-2165
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0005)
CVE-2014-0005
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0018)
CVE-2014-0018
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0093)
CVE-2014-0093
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3464)
CVE-2014-3464
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3472)
CVE-2014-3472
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3586)
CVE-2014-3586
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7827)
CVE-2014-7827
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7849)
CVE-2014-7849
CWE-264
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5304)
CVE-2015-5304
CWE-264
Low
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-2141)
CVE-2016-2141
CWE-264
Critical
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5406)
CVE-2016-5406
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8656)
CVE-2016-8656
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8657)
CVE-2016-8657
CWE-264
High
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-3894)
CVE-2019-3894
CWE-264
High
Jboss EAP Reachable Assertion Vulnerability (CVE-2020-25710)
CVE-2020-25710
CWE-617
High
Jboss EAP Resource Management Errors Vulnerability (CVE-2016-7046)
CVE-2016-7046
-
Medium
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-14721)
CVE-2018-14721
CWE-918
Critical
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2026-4366)
CVE-2026-4366
CWE-918
Medium
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2026-4874)
CVE-2026-4874
CWE-918
Low
Jboss EAP Session Fixation Vulnerability (CVE-2021-20324)
CVE-2021-20324
CWE-384
Medium
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2014-0118)
CVE-2014-0118
CWE-400
Medium
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
CVE-2016-8610
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8627)
CVE-2016-8627
CWE-400
Medium
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2017-12174)
CVE-2017-12174
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
CVE-2019-14888
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
CVE-2019-19343
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14340)
CVE-2020-14340
CWE-400
Medium
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14384)
CVE-2020-14384
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25644)
CVE-2020-25644
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25689)
CVE-2020-25689
CWE-400
Medium
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629)
CVE-2021-3629
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690)
CVE-2021-3690
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
CVE-2023-44487
CWE-400
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2024-1635)
CVE-2024-1635
CWE-400
High
Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12617)
CVE-2017-12617
CWE-434
High
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2011-2487)
CVE-2011-2487
CWE-327
Medium
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
CVE-2018-1000180
CWE-327
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2017-7536)
CVE-2017-7536
CWE-470
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2019-10174)
CVE-2019-10174
CWE-470
High
Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632)
CVE-2018-1000632
CWE-91
High
JBoss HttpAdaptor JMXInvokerServlet
-
CWE-94
High
JBoss InvokerTransformer Remote Code Execution
CVE-2015-7501
CWE-502
High
JBoss JMX Console Unrestricted Access
-
CWE-200
High
JBoss JMX management console
-
CWE-200
High
JBoss Seam framework remote code execution
CVE-2010-1871
CWE-94
High
JBoss Seam remoting vulnerabilities
CVE-2013-6448
CWE-611
High
JBoss Server MBean
-
CWE-200
High
JBoss ServerInfo MBean
CVE-2010-0738
CWE-200
High
JBoss status servlet information leak
CVE-2010-1429
CWE-200
Medium
JBoss Web Console JMX Invoker
-
CWE-200
High
JBoss web service console
-
CWE-200
Low
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9634)
CVE-2014-9634
-
Medium
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9635)
CVE-2014-9635
-
Medium
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-21607)
CVE-2021-21607
CWE-770
Medium
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27900)
CVE-2023-27900
CWE-770
High
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27901)
CVE-2023-27901
CWE-770
High
Jenkins Cleartext Storage of Sensitive Information Vulnerability (CVE-2025-27622)
CVE-2025-27622
CWE-312
Medium
«
1
...
53
54
55
...
325
»