🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ High Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
High Severity Vulnerabilities
Found
13053 vulnerabilities
at
High
severity.
Vulnerability Name
CVE
CWE
Severity
Sqlite Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
CVE-2015-3414
CWE-908
High
PHP Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
CVE-2015-3414
CWE-908
High
PHP Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
Sqlite Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
Sqlite Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-3717)
CVE-2015-3717
CWE-120
High
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3881)
CVE-2015-3881
-
High
PHP Numeric Errors Vulnerability (CVE-2015-4022)
CVE-2015-4022
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4025)
CVE-2015-4025
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4026)
CVE-2015-4026
-
High
PHP Data Processing Errors Vulnerability (CVE-2015-4147)
CVE-2015-4147
-
High
PHP Improper Input Validation Vulnerability (CVE-2015-4604)
CVE-2015-4604
CWE-20
High
PHP Improper Input Validation Vulnerability (CVE-2015-4605)
CVE-2015-4605
CWE-20
High
PHP Other Vulnerability (CVE-2015-4644)
CVE-2015-4644
-
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4654)
CVE-2015-4654
CWE-138
High
ownCloud Resource Management Errors Vulnerability (CVE-2015-4717)
CVE-2015-4717
-
High
concrete5 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4724)
CVE-2015-4724
CWE-138
High
MySQL CVE-2015-4819 Vulnerability (CVE-2015-4819)
CVE-2015-4819
-
High
Oracle Database Server CVE-2015-4873 Vulnerability (CVE-2015-4873)
CVE-2015-4873
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5143)
CVE-2015-5143
-
High
Django Resource Management Errors Vulnerability (CVE-2015-5145)
CVE-2015-5145
-
High
Moodle 7PK - Security Features Vulnerability (CVE-2015-5267)
CVE-2015-5267
-
High
Jenkins Improper Access Control Vulnerability (CVE-2015-5325)
CVE-2015-5325
CWE-284
High
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5338)
CVE-2015-5338
CWE-352
High
Apache Tomcat Other Vulnerability (CVE-2015-5346)
CVE-2015-5346
-
High
Apache Tomcat Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5351)
CVE-2015-5351
CWE-352
High
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5383)
CVE-2015-5383
CWE-200
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5590)
CVE-2015-5590
CWE-119
High
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-5591)
CVE-2015-5591
CWE-138
High
Python Other Vulnerability (CVE-2015-5652)
CVE-2015-5652
-
High
SugarCRM Incomplete List of Disallowed Inputs Vulnerability (CVE-2015-5946)
CVE-2015-5946
CWE-184
High
Magento Improper Input Validation Vulnerability (CVE-2015-6497)
CVE-2015-6497
CWE-20
High
ownCloud Resource Management Errors Vulnerability (CVE-2015-6500)
CVE-2015-6500
-
High
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-6659)
CVE-2015-6659
CWE-138
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-6728)
CVE-2015-6728
CWE-352
High
PHP Use After Free Vulnerability (CVE-2015-6831)
CVE-2015-6831
CWE-416
High
PHP Other Vulnerability (CVE-2015-6832)
CVE-2015-6832
-
High
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-6833)
CVE-2015-6833
CWE-22
High
PHP Other Vulnerability (CVE-2015-6836)
CVE-2015-6836
-
High
PHP Other Vulnerability (CVE-2015-6837)
CVE-2015-6837
-
High
PHP Other Vulnerability (CVE-2015-6838)
CVE-2015-6838
-
High
Plone CMS Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7293)
CVE-2015-7293
CWE-352
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7297)
CVE-2015-7297
CWE-138
High
Plone CMS Improper Input Validation Vulnerability (CVE-2015-7318)
CVE-2015-7318
CWE-20
High
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7367)
CVE-2015-7367
CWE-284
High
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7369)
CVE-2015-7369
CWE-284
High
ReviveAdserver Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-7372)
CVE-2015-7372
CWE-22
High
IBM RTC Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-7440)
CVE-2015-7440
CWE-264
High
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537)
CVE-2015-7537
CWE-352
High
Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538)
CVE-2015-7538
-
High
Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539)
CVE-2015-7539
CWE-345
High
Ruby Improper Input Validation Vulnerability (CVE-2015-7551)
CVE-2015-7551
CWE-20
High
Ruby on Rails Resource Management Errors Vulnerability (CVE-2015-7581)
CVE-2015-7581
-
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7857)
CVE-2015-7857
CWE-138
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7858)
CVE-2015-7858
CWE-138
High
MongoDb Improper Authentication Vulnerability (CVE-2015-7882)
CVE-2015-7882
CWE-287
High
MediaWiki Improper Access Control Vulnerability (CVE-2015-8008)
CVE-2015-8008
CWE-284
High
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8379)
CVE-2015-8379
CWE-352
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-8387)
CVE-2015-8387
CWE-190
High
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8393)
CVE-2015-8393
CWE-200
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8562)
CVE-2015-8562
CWE-20
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8564)
CVE-2015-8564
CWE-20
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8565)
CVE-2015-8565
CWE-20
High
PHP Other Vulnerability (CVE-2015-8616)
CVE-2015-8616
-
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8623)
CVE-2015-8623
CWE-352
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8624)
CVE-2015-8624
CWE-352
High
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8625)
CVE-2015-8625
CWE-200
High
Apache Tomcat Integer Overflow or Wraparound Vulnerability (CVE-2015-8751)
CVE-2015-8751
CWE-190
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-8769)
CVE-2015-8769
CWE-138
High
Dotclear Improper Access Control Vulnerability (CVE-2015-8832)
CVE-2015-8832
CWE-284
High
Varnish Cache Other Vulnerability (CVE-2015-8852)
CVE-2015-8852
-
High
Perl Improper Input Validation Vulnerability (CVE-2015-8853)
CVE-2015-8853
CWE-20
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-8865)
CVE-2015-8865
CWE-119
High
PHP Cryptographic Issues Vulnerability (CVE-2015-8867)
CVE-2015-8867
-
High
« Previous
1
...
25
26
27
28
29
30
31
32
...
175
Next »