Platform
Solutions
Pricing
Why Invicti
Resources Library
Get a demo
Home
/
Web Application Vulnerabilities
/ High Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
High Severity Vulnerabilities
Found
12791 vulnerabilities
at
High
severity.
Vulnerability Name
CVE
CWE
Severity
PHP Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
Sqlite Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
Sqlite Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-3717)
CVE-2015-3717
CWE-120
High
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3881)
CVE-2015-3881
-
High
PHP Numeric Errors Vulnerability (CVE-2015-4022)
CVE-2015-4022
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4025)
CVE-2015-4025
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4026)
CVE-2015-4026
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4147)
CVE-2015-4147
-
High
PHP Improper Input Validation Vulnerability (CVE-2015-4604)
CVE-2015-4604
CWE-20
High
PHP Improper Input Validation Vulnerability (CVE-2015-4605)
CVE-2015-4605
CWE-20
High
PHP Other Vulnerability (CVE-2015-4644)
CVE-2015-4644
-
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4654)
CVE-2015-4654
CWE-138
High
ownCloud Resource Management Errors Vulnerability (CVE-2015-4717)
CVE-2015-4717
-
High
concrete5 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4724)
CVE-2015-4724
CWE-138
High
MySQL CVE-2015-4819 Vulnerability (CVE-2015-4819)
CVE-2015-4819
-
High
Oracle Database Server CVE-2015-4873 Vulnerability (CVE-2015-4873)
CVE-2015-4873
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5143)
CVE-2015-5143
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5145)
CVE-2015-5145
-
High
Moodle 7PK - Security Features Vulnerability (CVE-2015-5267)
CVE-2015-5267
-
High
Jenkins Improper Access Control Vulnerability (CVE-2015-5325)
CVE-2015-5325
CWE-284
High
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5338)
CVE-2015-5338
CWE-352
High
Apache Tomcat Other Vulnerability (CVE-2015-5346)
CVE-2015-5346
-
High
Apache Tomcat Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5351)
CVE-2015-5351
CWE-352
High
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5383)
CVE-2015-5383
CWE-200
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5590)
CVE-2015-5590
CWE-119
High
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-5591)
CVE-2015-5591
CWE-138
High
Python Other Vulnerability (CVE-2015-5652)
CVE-2015-5652
-
High
SugarCRM Incomplete List of Disallowed Inputs Vulnerability (CVE-2015-5946)
CVE-2015-5946
CWE-184
High
Magento Improper Input Validation Vulnerability (CVE-2015-6497)
CVE-2015-6497
CWE-20
High
ownCloud Resource Management Errors Vulnerability (CVE-2015-6500)
CVE-2015-6500
-
High
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-6659)
CVE-2015-6659
CWE-138
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-6728)
CVE-2015-6728
CWE-352
High
PHP Use After Free Vulnerability (CVE-2015-6831)
CVE-2015-6831
CWE-416
High
PHP Other Vulnerability (CVE-2015-6832)
CVE-2015-6832
-
High
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-6833)
CVE-2015-6833
CWE-22
High
PHP Other Vulnerability (CVE-2015-6836)
CVE-2015-6836
-
High
PHP Other Vulnerability (CVE-2015-6837)
CVE-2015-6837
-
High
PHP Other Vulnerability (CVE-2015-6838)
CVE-2015-6838
-
High
Plone CMS Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7293)
CVE-2015-7293
CWE-352
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7297)
CVE-2015-7297
CWE-138
High
Plone CMS Improper Input Validation Vulnerability (CVE-2015-7318)
CVE-2015-7318
CWE-20
High
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7367)
CVE-2015-7367
CWE-284
High
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7369)
CVE-2015-7369
CWE-284
High
ReviveAdserver Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-7372)
CVE-2015-7372
CWE-22
High
IBM RTC Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-7440)
CVE-2015-7440
CWE-264
High
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537)
CVE-2015-7537
CWE-352
High
Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538)
CVE-2015-7538
-
High
Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539)
CVE-2015-7539
CWE-345
High
Ruby Improper Input Validation Vulnerability (CVE-2015-7551)
CVE-2015-7551
CWE-20
High
Ruby on Rails Resource Management Errors Vulnerability (CVE-2015-7581)
CVE-2015-7581
-
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7857)
CVE-2015-7857
CWE-138
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7858)
CVE-2015-7858
CWE-138
High
MongoDb Improper Authentication Vulnerability (CVE-2015-7882)
CVE-2015-7882
CWE-287
High
MediaWiki Improper Access Control Vulnerability (CVE-2015-8008)
CVE-2015-8008
CWE-284
High
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8379)
CVE-2015-8379
CWE-352
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-8387)
CVE-2015-8387
CWE-190
High
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8393)
CVE-2015-8393
CWE-200
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8562)
CVE-2015-8562
CWE-20
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8564)
CVE-2015-8564
CWE-20
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8565)
CVE-2015-8565
CWE-20
High
PHP Other Vulnerability (CVE-2015-8616)
CVE-2015-8616
-
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8623)
CVE-2015-8623
CWE-352
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8624)
CVE-2015-8624
CWE-352
High
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8625)
CVE-2015-8625
CWE-200
High
Apache Tomcat Integer Overflow or Wraparound Vulnerability (CVE-2015-8751)
CVE-2015-8751
CWE-190
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-8769)
CVE-2015-8769
CWE-138
High
Dotclear Improper Access Control Vulnerability (CVE-2015-8832)
CVE-2015-8832
CWE-284
High
Varnish Cache Other Vulnerability (CVE-2015-8852)
CVE-2015-8852
-
High
Perl Improper Input Validation Vulnerability (CVE-2015-8853)
CVE-2015-8853
CWE-20
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-8865)
CVE-2015-8865
CWE-119
High
PHP Cryptographic Issues Vulnerability (CVE-2015-8867)
CVE-2015-8867
-
High
PHP Improper Input Validation Vulnerability (CVE-2015-8873)
CVE-2015-8873
CWE-20
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-8874)
CVE-2015-8874
CWE-119
High
« Previous
1
...
25
26
27
28
29
30
31
32
...
171
Next »