🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Web Application Vulnerabilities
This page lists
24302 vulnerabilities
in
62 categories
.
Critical: 1589
High: 13053
Medium: 8721
Low: 870
Information: 69
Vulnerability Name
CVE
CWE
Severity
Jenkins Other Vulnerability (CVE-2021-21689)
CVE-2021-21689
-
Critical
Jenkins Other Vulnerability (CVE-2021-21696)
CVE-2021-21696
-
Critical
Jenkins Other Vulnerability (CVE-2021-21697)
CVE-2021-21697
-
Critical
Jenkins Other Vulnerability (CVE-2022-2048)
CVE-2022-2048
-
Medium
Jenkins Passwords transmitted in plain text (CVE-2020-2251)
CVE-2020-2251
-
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-7330)
CVE-2013-7330
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058)
CVE-2014-2058
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2068)
CVE-2014-2068
CWE-264
Low
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3663)
CVE-2014-3663
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665)
CVE-2014-3665
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1806)
CVE-2015-1806
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1810)
CVE-2015-1810
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814)
CVE-2015-1814
CWE-264
High
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
CVE-2015-5323
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324)
CVE-2015-5324
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0788)
CVE-2016-0788
CWE-264
Critical
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3722)
CVE-2016-3722
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3725)
CVE-2016-3725
CWE-264
Medium
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21690 )
CVE-2021-21690
CWE-693
Critical
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21696 )
CVE-2021-21696
CWE-693
Critical
Jenkins Reliance on Reverse DNS Resolution for a Security-Critical Action Vulnerability (CVE-2026-33002)
CVE-2026-33002
CWE-350
High
Jenkins Resource Management Errors Vulnerability (CVE-2014-3661)
CVE-2014-3661
-
Medium
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067)
CVE-2018-1000067
CWE-918
Medium
Jenkins Session Fixation Vulnerability (CVE-2018-1000409)
CVE-2018-1000409
CWE-384
Medium
Jenkins Session Fixation Vulnerability (CVE-2021-21671)
CVE-2021-21671
CWE-384
High
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2021-21615)
CVE-2021-21615
CWE-367
Medium
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785)
CVE-2012-0785
CWE-400
High
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
CVE-2021-28165
CWE-400
High
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-43859)
CVE-2021-43859
CWE-400
Medium
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497)
CVE-2023-43497
CWE-434
High
Jenkins URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2025-27625)
CVE-2025-27625
CWE-601
Medium
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099)
CVE-2020-2099
CWE-330
High
Jenkins user enumeration
-
CWE-200
Low
Jenkins weak password
-
CWE-200
High
JetBrains .idea project directory
-
CWE-538
Medium
JetLeak vulnerability
CVE-2015-2080
CWE-200
High
Jetpack 2.9.3: Critical Security Update
CVE-2014-0173
CWE-287
High
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-26048)
CVE-2023-26048
CWE-770
Medium
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-22201)
CVE-2024-22201
CWE-770
High
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-6762)
CVE-2024-6762
CWE-770
Medium
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-8184)
CVE-2024-8184
CWE-770
Medium
Jetty ConcatServlet Information Disclosure (CVE-2021-28169)
CVE-2021-28169
CWE-200
Medium
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656)
CVE-2017-7656
-
High
Jetty CVE-2018-12536 Vulnerability (CVE-2018-12536)
CVE-2018-12536
-
Medium
Jetty CVE-2020-27218 Vulnerability (CVE-2020-27218)
CVE-2020-27218
-
Medium
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049)
CVE-2023-26049
-
Medium
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167)
CVE-2023-40167
-
Medium
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045)
CVE-2009-5045
CWE-200
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
CVE-2015-2080
CWE-200
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169)
CVE-2021-28169
CWE-200
Medium
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429)
CVE-2021-34429
CWE-200
Medium
Jetty Improper Access Control Vulnerability (CVE-2016-4800)
CVE-2016-4800
CWE-284
Critical
Jetty Improper Input Validation Vulnerability (CVE-2022-2047)
CVE-2022-2047
CWE-20
Low
Jetty Improper Input Validation Vulnerability (CVE-2025-11143)
CVE-2025-11143
CWE-20
Medium
Jetty Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-28163)
CVE-2021-28163
CWE-59
Low
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046)
CVE-2009-5046
CWE-707
Medium
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479)
CVE-2023-36479
CWE-149
Medium
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191)
CVE-2022-2191
CWE-404
High
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2024-13009)
CVE-2024-13009
CWE-404
High
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047)
CVE-2009-5047
CWE-119
Critical
Jetty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7658)
CVE-2017-7658
CWE-444
Critical
Jetty Information Disclosure (CVE-2021-34429)
CVE-2021-28164
CWE-200
Medium
Jetty Insufficient Session Expiration Vulnerability (CVE-2021-34428)
CVE-2021-34428
CWE-613
Low
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2017-7657)
CVE-2017-7657
CWE-190
Critical
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
CVE-2023-36478
CWE-190
High
Jetty Missing Release of Memory after Effective Lifetime Vulnerability (CVE-2026-1605)
CVE-2026-1605
CWE-401
High
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735)
CVE-2017-9735
CWE-203
High
Jetty Other Vulnerability (CVE-2020-27216)
CVE-2020-27216
-
High
Jetty Other Vulnerability (CVE-2024-6763)
CVE-2024-6763
-
Medium
Jetty Session Fixation Vulnerability (CVE-2018-12538)
CVE-2018-12538
CWE-384
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223)
CVE-2020-27223
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
CVE-2021-28165
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048)
CVE-2022-2048
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
CVE-2023-44487
CWE-400
High
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2024-9823)
CVE-2024-9823
CWE-400
High
«
1
...
57
58
59
...
325
»