🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Medium Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Medium Severity Vulnerabilities
Found
8734 vulnerabilities
at
Medium
severity.
Vulnerability Name
CVE
CWE
Severity
Ruby Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-1891)
CVE-2008-1891
CWE-22
Medium
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-1918)
CVE-2008-1918
CWE-138
Medium
Perl Resource Management Errors Vulnerability (CVE-2008-1927)
CVE-2008-1927
-
Medium
Apache Tomcat Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-1947)
CVE-2008-1947
CWE-707
Medium
e107 Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2020)
CVE-2008-2020
CWE-264
Medium
XOOPS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2035)
CVE-2008-2035
CWE-707
Medium
SugarCRM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-2045)
CVE-2008-2045
CWE-22
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2068)
CVE-2008-2068
CWE-707
Medium
MySQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2079)
CVE-2008-2079
CWE-264
Medium
Apache HTTP Server Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2168)
CVE-2008-2168
CWE-707
Medium
Apache HTTP Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2008-2364)
CVE-2008-2364
CWE-770
Medium
Apache Tomcat Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-2370)
CVE-2008-2370
CWE-22
Medium
Dot CMS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2397)
CVE-2008-2397
CWE-707
Medium
Resin Application Server Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2462)
CVE-2008-2462
CWE-707
Medium
LimeSurvey Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2571)
CVE-2008-2571
CWE-707
Medium
WebLogic CVE-2008-2578 Vulnerability (CVE-2008-2578)
CVE-2008-2578
-
Medium
Oracle Application Server CVE-2008-2583 Vulnerability (CVE-2008-2583)
CVE-2008-2583
-
Medium
Oracle Application Server CVE-2008-2589 Vulnerability (CVE-2008-2589)
CVE-2008-2589
-
Medium
Oracle Database Server CVE-2008-2591 Vulnerability (CVE-2008-2591)
CVE-2008-2591
-
Medium
Oracle Database Server CVE-2008-2592 Vulnerability (CVE-2008-2592)
CVE-2008-2592
-
Medium
Oracle Application Server CVE-2008-2593 Vulnerability (CVE-2008-2593)
CVE-2008-2593
-
Medium
Oracle Database Server CVE-2008-2600 Vulnerability (CVE-2008-2600)
CVE-2008-2600
-
Medium
Oracle Database Server CVE-2008-2602 Vulnerability (CVE-2008-2602)
CVE-2008-2602
-
Medium
Oracle Database Server CVE-2008-2604 Vulnerability (CVE-2008-2604)
CVE-2008-2604
-
Medium
Oracle Database Server CVE-2008-2605 Vulnerability (CVE-2008-2605)
CVE-2008-2605
-
Medium
Oracle Database Server CVE-2008-2607 Vulnerability (CVE-2008-2607)
CVE-2008-2607
-
Medium
Oracle Database Server CVE-2008-2608 Vulnerability (CVE-2008-2608)
CVE-2008-2608
-
Medium
Oracle Application Server CVE-2008-2609 Vulnerability (CVE-2008-2609)
CVE-2008-2609
-
Medium
Oracle Database Server CVE-2008-2611 Vulnerability (CVE-2008-2611)
CVE-2008-2611
-
Medium
Oracle Database Server CVE-2008-2613 Vulnerability (CVE-2008-2613)
CVE-2008-2613
-
Medium
Oracle Application Server CVE-2008-2614 Vulnerability (CVE-2008-2614)
CVE-2008-2614
-
Medium
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-2665)
CVE-2008-2665
CWE-22
Medium
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-2666)
CVE-2008-2666
CWE-22
Medium
TYPO3 Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2717)
CVE-2008-2717
CWE-264
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2718)
CVE-2008-2718
CWE-707
Medium
GlassFish Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2751)
CVE-2008-2751
CWE-707
Medium
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2771)
CVE-2008-2771
CWE-264
Medium
Perl Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2827)
CVE-2008-2827
CWE-264
Medium
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-2829)
CVE-2008-2829
CWE-119
Medium
Family Connections Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-2901)
CVE-2008-2901
CWE-138
Medium
Apache Tomcat Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-2938)
CVE-2008-2938
CWE-22
Medium
Apache HTTP Server Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-2939)
CVE-2008-2939
CWE-707
Medium
Trac URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2008-2951)
CVE-2008-2951
CWE-601
Medium
MyBB Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3069)
CVE-2008-3069
CWE-707
Medium
Python Integer Overflow or Wraparound Vulnerability (CVE-2008-3144)
CVE-2008-3144
CWE-190
Medium
Drupal Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3218)
CVE-2008-3218
CWE-707
Medium
Drupal Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3219)
CVE-2008-3219
CWE-707
Medium
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3220)
CVE-2008-3220
CWE-352
Medium
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3221)
CVE-2008-3221
CWE-352
Medium
Drupal Session Fixation Vulnerability (CVE-2008-3222)
CVE-2008-3222
CWE-384
Medium
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3226)
CVE-2008-3226
CWE-264
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3233)
CVE-2008-3233
CWE-707
Medium
Claroline Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3260)
CVE-2008-3260
CWE-707
Medium
Claroline Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-3261)
CVE-2008-3261
CWE-59
Medium
Claroline Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3262)
CVE-2008-3262
CWE-352
Medium
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3271)
CVE-2008-3271
CWE-264
Medium
XOOPS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3295)
CVE-2008-3295
CWE-707
Medium
Claroline Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3315)
CVE-2008-3315
CWE-707
Medium
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3325)
CVE-2008-3325
CWE-352
Medium
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2008-3327)
CVE-2008-3327
CWE-200
Medium
MyBB Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3334)
CVE-2008-3334
CWE-707
Medium
ATutor Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-3368)
CVE-2008-3368
CWE-94
Medium
Ruby Resource Management Errors Vulnerability (CVE-2008-3443)
CVE-2008-3443
-
Medium
phpMyAdmin Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-3456)
CVE-2008-3456
CWE-59
Medium
Jboss EAP Configuration Vulnerability (CVE-2008-3519)
CVE-2008-3519
-
Medium
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-3659)
CVE-2008-3659
CWE-119
Medium
PHP Improper Input Validation Vulnerability (CVE-2008-3660)
CVE-2008-3660
CWE-20
Medium
Drupal Other Vulnerability (CVE-2008-3661)
CVE-2008-3661
-
Medium
Dot CMS Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-3708)
CVE-2008-3708
CWE-22
Medium
Drupal Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3740)
CVE-2008-3740
CWE-707
Medium
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3742)
CVE-2008-3742
CWE-264
Medium
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3743)
CVE-2008-3743
CWE-352
Medium
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2008-3744)
CVE-2008-3744
CWE-352
Medium
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3745)
CVE-2008-3745
CWE-264
Medium
Ruby Improper Input Validation Vulnerability (CVE-2008-3790)
CVE-2008-3790
CWE-20
Medium
« Previous
1
...
14
15
16
17
18
19
20
21
...
117
Next »