🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Configuration
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.3.2229
Configuration
This page lists
407 vulnerabilities
in this category.
Critical: 4
High: 133
Medium: 174
Low: 51
Information: 45
Vulnerability Name
CVE
CWE
Severity
ASP.NET ViewState Weak Validation Key
-
CWE-321
Critical
Kentico Staging API Authentication Bypass
CVE-2025-2746
CWE-287
Critical
Unrestricted access to Apache HugeGraph
-
CWE-200
Critical
Lucee Unset Admin Password
-
CWE-200
Critical
Trace.axd Detected
-
CWE-215
High
Atlassian Jira insecure REST permissions
-
-
High
XML external entity injection
-
CWE-611
High
XML External Entity Injection via external file
-
CWE-611
High
XML external entity injection via File Upload
-
CWE-611
High
XML external entity injection (variant)
-
CWE-611
High
Elmah.axd / Errorlog.axd Detected
-
CWE-209
High
Nginx PHP code execution via FastCGI
-
CWE-94
High
Insecure Transportation Security Protocol Supported (TLS 1.0)
-
CWE-326
High
Joomla! Core Security Bypass
CVE-2017-11364
CWE-264
High
CouchDB REST API publicly accessible
-
CWE-285
High
Web Cache Poisoning
-
CWE-44
High
Adobe Experience Manager Misconfiguration
CVE-2016-0957
CWE-693
High
XML entity injection
-
CWE-611
High
Hadoop YARN ResourceManager publicly accessible
-
CWE-200
High
Jupyter Notebook publicly accessible
-
CWE-78
High
OSGi Management Console Default Credentials
-
CWE-521
High
Xdebug remote code execution via xdebug.remote_connect_back
-
CWE-200
High
BottlePy weak secret key
-
CWE-693
High
JWT Signature Bypass via None Algorithm
-
CWE-345
High
Weak Secret is Used to Sign JWT
-
CWE-345
High
XML external entity injection and XML injection
-
CWE-611
High
Unprotected phpMyAdmin interface
-
CWE-205
High
Padding oracle attack
-
CWE-209
High
Ruby on Rails weak/known secret token
CVE-2013-0156
CWE-200
High
Insecure Transportation Security Protocol Supported (SSLv2)
-
CWE-326
High
Insecure Transportation Security Protocol Supported (SSLv3)
-
CWE-326
High
Reachable SharePoint interface
-
CWE-200
High
SharePoint user enumeration
-
CWE-200
High
Struts 2 development mode
-
CWE-489
High
Elasticsearch service accessible
-
CWE-200
High
Roundcube security updates 0.8.6 and 0.7.3
CVE-2013-1904
CWE-22
High
CodeIgniter weak encryption key
-
CWE-200
High
Apache Geronimo default administrative credentials
-
CWE-693
High
Apache solr service exposed
-
CWE-200
High
Apache Tomcat insecure default administrative password
CVE-2009-3548
CWE-284
High
JBoss BSHDeployer MBean
-
CWE-200
High
JBoss HttpAdaptor JMXInvokerServlet
-
CWE-94
High
JBoss JMX management console
-
CWE-200
High
JBoss ServerInfo MBean
CVE-2010-0738
CWE-200
High
JBoss Server MBean
-
CWE-200
High
JBoss JMX Console Unrestricted Access
-
CWE-200
High
JBoss Web Console JMX Invoker
-
CWE-200
High
Ruby framework weak secret key
-
CWE-693
High
Oracle PeopleSoft SSO weak secret key
-
CWE-693
High
SAP Knowledge Management and Collaboration (KMC) incorrect permissions
-
CWE-285
High
SAP Management Console list logfiles
-
CWE-200
High
Consul API publicly exposed
-
CWE-200
High
Python Debugger Unauthorized Access Vulnerability
-
CWE-200
High
qdPM Information Disclosure
-
CWE-260
High
Virtual Host locations misconfiguration
-
CWE-200
High
ASP.NET connection strings stored in plaintext
-
CWE-16
High
Jenkins Git Plugin missing permission check (CVE-2022-36883)
CVE-2022-36883
CWE-862
High
Pentaho API Auth bypass (CVE-2021-31602)
CVE-2021-31602
CWE-863
High
Struts2 Development Mode Enabled
-
CWE-16
High
Weak WordPress security key
-
CWE-16
High
TorchServe Management API publicly exposed
CVE-2023-43654
CWE-200
High
Node.js Debugger Unauthorized Access Vulnerability
-
CWE-200
High
Case-Insensitive Routing Bypass in Express.js Application
-
CWE-287
High
Web Cache Deception
-
-
High
Harbor Unauthorized Access Vulnerability
CVE-2022-46463
CWE-200
High
Adobe Experience Manager Expression Language injection via cloudsettings
CVE-2025-54246
CWE-94
High
Adobe Experience Manager SSRF via MS token verify servlet
CVE-2025-54246
CWE-918
High
Adobe Experience Manager Blind XXE via package upload
CVE-2025-54246
CWE-611
High
Adobe Experience Manager exposed user passwords via querybuilder
CVE-2025-54246
CWE-200
High
Adobe Experience Manager writable JCR nodes via querybuilder
CVE-2025-54246
CWE-276
High
JWT Signature is not Verified
-
CWE-287
High
Node.js Inspector Unauthorized Access Vulnerability
-
CWE-200
High
Unrestricted access to Kong Gateway API
-
CWE-200
High
SAP Management Console get user list
-
CWE-200
High
Web Cache Poisoning via POST Request
-
CWE-44
High
1
2
3
4
...
6
»