Platform
Solutions
Pricing
Why Invicti
Resources Library
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
Web Application Vulnerabilities
This page lists
23441 vulnerabilities
in
68 categories
.
Critical: 1499
High: 12791
Medium: 8230
Low: 857
Information: 64
Vulnerability Name
CVE
CWE
Severity
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049)
CVE-2023-26049
-
Medium
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167)
CVE-2023-40167
-
Medium
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045)
CVE-2009-5045
CWE-200
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
CVE-2015-2080
CWE-200
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169)
CVE-2021-28169
CWE-200
Medium
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429)
CVE-2021-34429
CWE-200
Medium
Jetty Improper Access Control Vulnerability (CVE-2016-4800)
CVE-2016-4800
CWE-284
Critical
Jetty Improper Input Validation Vulnerability (CVE-2022-2047)
CVE-2022-2047
CWE-20
Low
Jetty Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-28163)
CVE-2021-28163
CWE-59
Low
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046)
CVE-2009-5046
CWE-707
Medium
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479)
CVE-2023-36479
CWE-149
Medium
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191)
CVE-2022-2191
CWE-404
High
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2024-13009)
CVE-2024-13009
CWE-404
High
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047)
CVE-2009-5047
CWE-119
Critical
Jetty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7658)
CVE-2017-7658
CWE-444
Critical
Jetty Information Disclosure (CVE-2021-34429)
CVE-2021-28164
CWE-200
Medium
Jetty Insufficient Session Expiration Vulnerability (CVE-2021-34428)
CVE-2021-34428
CWE-613
Low
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2017-7657)
CVE-2017-7657
CWE-190
Critical
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
CVE-2023-36478
CWE-190
High
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735)
CVE-2017-9735
CWE-203
High
Jetty Other Vulnerability (CVE-2020-27216)
CVE-2020-27216
-
High
Jetty Other Vulnerability (CVE-2024-6763)
CVE-2024-6763
-
Medium
Jetty Session Fixation Vulnerability (CVE-2018-12538)
CVE-2018-12538
CWE-384
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223)
CVE-2020-27223
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
CVE-2021-28165
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048)
CVE-2022-2048
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
CVE-2023-44487
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2024-9823)
CVE-2024-9823
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2025-1948)
CVE-2025-1948
CWE-400
High
Jetty Weak Authentication Vulnerability (CVE-2023-41900)
CVE-2023-41900
-
Medium
Jira Projects accessible anonymously
-
CWE-200
Low
Jira QueryComponent Information Disclosure (CVE-2020-14179)
CVE-2020-14179
CWE-288
Medium
JIRA Security Advisory 2012-08-28
-
CWE-79
High
JIRA Security Advisory 2013-02-21
-
CWE-22
High
JIRA Security Advisory 2014-02-26
-
CWE-22
High
Jira Seraph Authentication Bypass (CVE-2022-0540)
CVE-2022-0540
CWE-288
Critical
Jira SSTI CVE-2019-11581
CVE-2019-11581
CWE-22
High
Jira Unauthorized SSRF via REST API
CVE-2019-8451
CWE-918
High
Jira Unauthorized User Enumeration (CVE-2020-14181)
CVE-2020-14181
CWE-200
Medium
Jira Unauthorized User Enumeration via UserPickerBrowser
-
CWE-200
Low
Joe Editor DEADJOE file
-
CWE-538
Low
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-0168)
CVE-2014-0168
CWE-352
Medium
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899)
CVE-2018-10899
CWE-352
High
Jolokia Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000129)
CVE-2018-1000129
CWE-707
Medium
Jolokia XML External Entity (XXE) vulnerability
-
CWE-611
High
Joomla 1.5 end of life
-
CWE-1104
High
Joomla Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2005-4650)
CVE-2005-4650
CWE-770
Medium
Joomla Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2018-11324)
CVE-2018-11324
CWE-362
Medium
Joomla Configuration Vulnerability (CVE-2008-3228)
CVE-2008-3228
-
High
Joomla Credentials Management Errors Vulnerability (CVE-2016-9081)
CVE-2016-9081
-
Critical
Joomla Cross-Site Request Forgery (CSRF) (CVE-2021-26033)
CVE-2021-26033
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2009-1280)
CVE-2009-1280
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5397)
CVE-2015-5397
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8563)
CVE-2015-8563
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-17858)
CVE-2018-17858
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-18650)
CVE-2019-18650
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-10241)
CVE-2020-10241
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-13760)
CVE-2020-13760
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15695)
CVE-2020-15695
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15700)
CVE-2020-15700
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-35615)
CVE-2020-35615
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8419)
CVE-2020-8419
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8420)
CVE-2020-8420
CWE-352
High
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-26034)
CVE-2021-26034
CWE-352
Medium
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-23750)
CVE-2023-23750
CWE-352
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2008-4122)
CVE-2008-4122
-
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2011-4321)
CVE-2011-4321
-
Medium
Joomla Cryptographic Issues Vulnerability (CVE-2014-7228)
CVE-2014-7228
-
High
Joomla CVE-2006-4469 Vulnerability (CVE-2006-4469)
CVE-2006-4469
-
High
Joomla CVE-2006-4470 Vulnerability (CVE-2006-4470)
CVE-2006-4470
-
High
Joomla CVE-2006-4472 Vulnerability (CVE-2006-4472)
CVE-2006-4472
-
High
Joomla CVE-2009-3945 Vulnerability (CVE-2009-3945)
CVE-2009-3945
-
Medium
Joomla CVE-2012-0819 Vulnerability (CVE-2012-0819)
CVE-2012-0819
-
Medium
Joomla CVE-2012-0821 Vulnerability (CVE-2012-0821)
CVE-2012-0821
-
Medium
Joomla CVE-2012-0835 Vulnerability (CVE-2012-0835)
CVE-2012-0835
-
Medium
«
1
...
54
55
56
...
313
»