🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Critical Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Critical Severity Vulnerabilities
Found
1593 vulnerabilities
at
Critical
severity.
Vulnerability Name
CVE
CWE
Severity
Joomla Session Fixation Vulnerability (CVE-2007-4188)
CVE-2007-4188
CWE-384
Critical
Family Connections Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-4338)
CVE-2007-4338
CWE-264
Critical
OpenSSL Numeric Errors Vulnerability (CVE-2007-4995)
CVE-2007-4995
-
Critical
Frontaccounting Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2007-5117)
CVE-2007-5117
CWE-94
Critical
Oracle Application Server CVE-2007-5526 Vulnerability (CVE-2007-5526)
CVE-2007-5526
-
Critical
Oracle Database Server CVE-2007-5530 Vulnerability (CVE-2007-5530)
CVE-2007-5530
-
Critical
Oracle Database Server CVE-2007-5531 Vulnerability (CVE-2007-5531)
CVE-2007-5531
-
Critical
WordPress Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2007-6013)
CVE-2007-6013
CWE-327
Critical
Internet Information Services Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-0075)
CVE-2008-0075
CWE-94
Critical
Oracle Database Server CVE-2008-0339 Vulnerability (CVE-2008-0339)
CVE-2008-0339
-
Critical
Oracle Database Server CVE-2008-0340 Vulnerability (CVE-2008-0340)
CVE-2008-0340
-
Critical
Oracle Application Server CVE-2008-0340 Vulnerability (CVE-2008-0340)
CVE-2008-0340
-
Critical
Oracle Database Server CVE-2008-0341 Vulnerability (CVE-2008-0341)
CVE-2008-0341
-
Critical
Oracle Database Server CVE-2008-0342 Vulnerability (CVE-2008-0342)
CVE-2008-0342
-
Critical
Oracle Application Server CVE-2008-0343 Vulnerability (CVE-2008-0343)
CVE-2008-0343
-
Critical
Oracle Database Server CVE-2008-0343 Vulnerability (CVE-2008-0343)
CVE-2008-0343
-
Critical
Oracle Application Server CVE-2008-0344 Vulnerability (CVE-2008-0344)
CVE-2008-0344
-
Critical
Oracle Database Server CVE-2008-0344 Vulnerability (CVE-2008-0344)
CVE-2008-0344
-
Critical
Oracle Application Server CVE-2008-0345 Vulnerability (CVE-2008-0345)
CVE-2008-0345
-
Critical
Oracle Database Server CVE-2008-0345 Vulnerability (CVE-2008-0345)
CVE-2008-0345
-
Critical
Oracle Application Server CVE-2008-0346 Vulnerability (CVE-2008-0346)
CVE-2008-0346
-
Critical
Oracle Database Server CVE-2008-0346 Vulnerability (CVE-2008-0346)
CVE-2008-0346
-
Critical
Oracle Application Server CVE-2008-0347 Vulnerability (CVE-2008-0347)
CVE-2008-0347
-
Critical
Oracle Database Server CVE-2008-0347 Vulnerability (CVE-2008-0347)
CVE-2008-0347
-
Critical
Oracle Database Server CVE-2008-0348 Vulnerability (CVE-2008-0348)
CVE-2008-0348
-
Critical
Oracle Application Server CVE-2008-0348 Vulnerability (CVE-2008-0348)
CVE-2008-0348
-
Critical
Oracle Application Server CVE-2008-0349 Vulnerability (CVE-2008-0349)
CVE-2008-0349
-
Critical
Oracle Database Server CVE-2008-0349 Vulnerability (CVE-2008-0349)
CVE-2008-0349
-
Critical
PHP Incorrect Calculation of Buffer Size Vulnerability (CVE-2008-0599)
CVE-2008-0599
CWE-131
Critical
Internet Information Services Integer Overflow or Wraparound Vulnerability (CVE-2008-1446)
CVE-2008-1446
CWE-190
Critical
Oracle Application Server CVE-2008-1812 Vulnerability (CVE-2008-1812)
CVE-2008-1812
-
Critical
Oracle Database Server CVE-2008-1814 Vulnerability (CVE-2008-1814)
CVE-2008-1814
-
Critical
Oracle Application Server CVE-2008-1814 Vulnerability (CVE-2008-1814)
CVE-2008-1814
-
Critical
Oracle Database Server CVE-2008-1817 Vulnerability (CVE-2008-1817)
CVE-2008-1817
-
Critical
Oracle Database Server CVE-2008-1818 Vulnerability (CVE-2008-1818)
CVE-2008-1818
-
Critical
Oracle Database Server CVE-2008-1821 Vulnerability (CVE-2008-1821)
CVE-2008-1821
-
Critical
Oracle Application Server CVE-2008-1824 Vulnerability (CVE-2008-1824)
CVE-2008-1824
-
Critical
Python Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2008-1887)
CVE-2008-1887
CWE-120
Critical
e107 Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-1989)
CVE-2008-1989
CWE-94
Critical
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-2050)
CVE-2008-2050
CWE-119
Critical
PHP CVE-2008-2051 Vulnerability (CVE-2008-2051)
CVE-2008-2051
-
Critical
PHP Insufficient Entropy Vulnerability (CVE-2008-2108)
CVE-2008-2108
CWE-331
Critical
WordPress Improper Input Validation Vulnerability (CVE-2008-2392)
CVE-2008-2392
CWE-20
Critical
LimeSurvey CVE-2008-2570 Vulnerability (CVE-2008-2570)
CVE-2008-2570
-
Critical
Ruby Numeric Errors Vulnerability (CVE-2008-2662)
CVE-2008-2662
-
Critical
Ruby Integer Overflow or Wraparound Vulnerability (CVE-2008-2663)
CVE-2008-2663
CWE-190
Critical
SharePoint Resource Management Errors Vulnerability (CVE-2008-3006)
CVE-2008-3006
-
Critical
Dolphin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-3167)
CVE-2008-3167
CWE-94
Critical
phpBB CVE-2008-3224 Vulnerability (CVE-2008-3224)
CVE-2008-3224
-
Critical
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3225)
CVE-2008-3225
CWE-264
Critical
Dotclear Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-3232)
CVE-2008-3232
CWE-94
Critical
WebLogic Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-3257)
CVE-2008-3257
CWE-119
Critical
SharePoint Integer Overflow or Wraparound Vulnerability (CVE-2008-4019)
CVE-2008-4019
CWE-190
Critical
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-4769)
CVE-2008-4769
CWE-22
Critical
WordPress Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2008-4796)
CVE-2008-4796
CWE-138
Critical
Python Numeric Errors Vulnerability (CVE-2008-5031)
CVE-2008-5031
-
Critical
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-5557)
CVE-2008-5557
CWE-119
Critical
PrestaShop CVE-2008-5791 Vulnerability (CVE-2008-5791)
CVE-2008-5791
-
Critical
Drupal Configuration Vulnerability (CVE-2008-6171)
CVE-2008-6171
-
Critical
WordPress CVE-2008-6767 Vulnerability (CVE-2008-6767)
CVE-2008-6767
-
Critical
Oracle Application Server CVE-2008-7233 Vulnerability (CVE-2008-7233)
CVE-2008-7233
-
Critical
phpMyAdmin Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-7251)
CVE-2008-7251
CWE-264
Critical
phpMyAdmin Cryptographic Issues Vulnerability (CVE-2008-7252)
CVE-2008-7252
-
Critical
TYPO3 Improper Input Validation Vulnerability (CVE-2009-0258)
CVE-2009-0258
CWE-20
Critical
Oracle Database Server CVE-2009-1020 Vulnerability (CVE-2009-1020)
CVE-2009-1020
-
Critical
phpMyAdmin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2009-1151)
CVE-2009-1151
CWE-94
Critical
Oracle Database Server CVE-2009-1979 Vulnerability (CVE-2009-1979)
CVE-2009-1979
-
Critical
Oracle Database Server CVE-2009-1985 Vulnerability (CVE-2009-1985)
CVE-2009-1985
-
Critical
Oracle Database Server CVE-2009-1992 Vulnerability (CVE-2009-1992)
CVE-2009-1992
-
Critical
Ruby on Rails Improper Authentication Vulnerability (CVE-2009-2422)
CVE-2009-2422
CWE-287
Critical
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-2853)
CVE-2009-2853
CWE-264
Critical
Internet Information Services Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2009-3023)
CVE-2009-3023
CWE-120
Critical
OpenSSL Improper Input Validation Vulnerability (CVE-2009-3245)
CVE-2009-3245
CWE-20
Critical
Drupal CVE-2009-3352 Vulnerability (CVE-2009-3352)
CVE-2009-3352
-
Critical
Oracle Database Server CVE-2009-3415 Vulnerability (CVE-2009-3415)
CVE-2009-3415
-
Critical
« Previous
1
2
3
4
5
6
7
8
9
...
22
Next »