🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
Django Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2011-4140)
CVE-2011-4140
CWE-352
Medium
Django Improper Input Validation Vulnerability (CVE-2011-4139)
CVE-2011-4139
CWE-20
Medium
MySQL CVE-2018-2646 Vulnerability (CVE-2018-2646)
CVE-2018-2646
-
Medium
MySQL CVE-2018-2645 Vulnerability (CVE-2018-2645)
CVE-2018-2645
-
Medium
Bootstrap Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-14040)
CVE-2018-14040
CWE-707
Medium
Oracle JRE CVE-2018-2641 Vulnerability (CVE-2018-2641)
CVE-2018-2641
-
Medium
Django Improper Input Validation Vulnerability (CVE-2011-4138)
CVE-2011-4138
CWE-20
Medium
Mailman Improper Input Validation Vulnerability (CVE-2018-13796)
CVE-2018-13796
CWE-20
Medium
MySQL CVE-2018-2640 Vulnerability (CVE-2018-2640)
CVE-2018-2640
-
Medium
Django Resource Management Errors Vulnerability (CVE-2011-4137)
CVE-2011-4137
-
Medium
Django Improper Input Validation Vulnerability (CVE-2011-4136)
CVE-2011-4136
CWE-20
Medium
phpMyAdmin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-2505)
CVE-2011-2505
CWE-94
Medium
phpMyAdmin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-2507)
CVE-2011-2507
CWE-94
Medium
Oracle JRE CVE-2018-2634 Vulnerability (CVE-2018-2634)
CVE-2018-2634
-
Medium
phpMyAdmin Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2011-2508)
CVE-2011-2508
CWE-22
Medium
Oracle JRE CVE-2018-2629 Vulnerability (CVE-2018-2629)
CVE-2018-2629
-
Medium
Joomla Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-2509)
CVE-2011-2509
CWE-707
Medium
Apache Tomcat Improper Input Validation Vulnerability (CVE-2011-2526)
CVE-2011-2526
CWE-20
Medium
MySQL CVE-2018-2813 Vulnerability (CVE-2018-2813)
CVE-2018-2813
-
Medium
Oracle JRE CVE-2018-2815 Vulnerability (CVE-2018-2815)
CVE-2018-2815
-
Medium
Django URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2018-14574)
CVE-2018-14574
CWE-601
Medium
MySQL CVE-2018-3137 Vulnerability (CVE-2018-3137)
CVE-2018-3137
-
Medium
MySQL CVE-2018-3161 Vulnerability (CVE-2018-3161)
CVE-2018-3161
-
Medium
MySQL CVE-2018-3156 Vulnerability (CVE-2018-3156)
CVE-2018-3156
-
Medium
Oracle Database Server CVE-2011-2230 Vulnerability (CVE-2011-2230)
CVE-2011-2230
-
Medium
Oracle Database Server CVE-2011-2231 Vulnerability (CVE-2011-2231)
CVE-2011-2231
-
Medium
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-4304)
CVE-2011-4304
CWE-200
Medium
Moodle Cryptographic Issues Vulnerability (CVE-2011-4303)
CVE-2011-4303
-
Medium
MyBB URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2018-10678)
CVE-2018-10678
CWE-601
Medium
Oracle Database Server CVE-2011-2232 Vulnerability (CVE-2011-2232)
CVE-2011-2232
-
Medium
MySQL CVE-2018-3145 Vulnerability (CVE-2018-3145)
CVE-2018-3145
-
Medium
MySQL CVE-2018-3144 Vulnerability (CVE-2018-3144)
CVE-2018-3144
-
Medium
Moodle Improper Input Validation Vulnerability (CVE-2011-4302)
CVE-2011-4302
CWE-20
Medium
MySQL CVE-2018-3143 Vulnerability (CVE-2018-3143)
CVE-2018-3143
-
Medium
Jboss EAP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-10862)
CVE-2018-10862
CWE-22
Medium
PHP Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-10547)
CVE-2018-10547
CWE-707
Medium
MySQL CVE-2018-3133 Vulnerability (CVE-2018-3133)
CVE-2018-3133
-
Medium
Moodle Insertion of Sensitive Information into Log File Vulnerability (CVE-2018-10889)
CVE-2018-10889
CWE-532
Medium
Next.js Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-18282)
CVE-2018-18282
CWE-707
Medium
Moodle CVE-2011-4301 Vulnerability (CVE-2011-4301)
CVE-2011-4301
-
Medium
MySQL CVE-2018-3123 Vulnerability (CVE-2018-3123)
CVE-2018-3123
-
Medium
Oracle Database Server CVE-2011-2238 Vulnerability (CVE-2011-2238)
CVE-2011-2238
-
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4300)
CVE-2011-4300
CWE-264
Medium
Moodle Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4299)
CVE-2011-4299
CWE-707
Medium
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2011-4298)
CVE-2011-4298
CWE-352
Medium
MySQL CVE-2018-3081 Vulnerability (CVE-2018-3081)
CVE-2018-3081
-
Medium
Jboss EAP Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-10934)
CVE-2018-10934
CWE-707
Medium
MySQL CVE-2018-3080 Vulnerability (CVE-2018-3080)
CVE-2018-3080
-
Medium
MySQL CVE-2018-3162 Vulnerability (CVE-2018-3162)
CVE-2018-3162
-
Medium
MySQL CVE-2018-3170 Vulnerability (CVE-2018-3170)
CVE-2018-3170
-
Medium
MySQL CVE-2018-3079 Vulnerability (CVE-2018-3079)
CVE-2018-3079
-
Medium
MySQL CVE-2018-3200 Vulnerability (CVE-2018-3200)
CVE-2018-3200
-
Medium
WebLogic CVE-2018-3248 Vulnerability (CVE-2018-3248)
CVE-2018-3248
-
Medium
MySQL CVE-2018-3247 Vulnerability (CVE-2018-3247)
CVE-2018-3247
-
Medium
Moodle Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4306)
CVE-2011-4306
CWE-707
Medium
Plone CMS Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1950)
CVE-2011-1950
CWE-264
Medium
MySQL CVE-2018-3212 Vulnerability (CVE-2018-3212)
CVE-2018-3212
-
Medium
Oracle Database Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2018-10237)
CVE-2018-10237
CWE-770
Medium
Java Code Execution Vulnerability (CVE-2018-3211)
CVE-2018-3211
-
Medium
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2018-10237)
CVE-2018-10237
CWE-770
Medium
GlassFish CVE-2018-3210 Vulnerability (CVE-2018-3210)
CVE-2018-3210
-
Medium
MySQL CVE-2018-3203 Vulnerability (CVE-2018-3203)
CVE-2018-3203
-
Medium
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2018-10237)
CVE-2018-10237
CWE-770
Medium
Cherokee Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2011-2191)
CVE-2011-2191
CWE-352
Medium
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2196)
CVE-2011-2196
CWE-264
Medium
MySQL CVE-2018-3171 Vulnerability (CVE-2018-3171)
CVE-2018-3171
-
Medium
MODX Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-10382)
CVE-2018-10382
CWE-707
Medium
MySQL CVE-2018-3195 Vulnerability (CVE-2018-3195)
CVE-2018-3195
-
Medium
Ruby on Rails Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-2197)
CVE-2011-2197
CWE-707
Medium
MySQL CVE-2018-3187 Vulnerability (CVE-2018-3187)
CVE-2018-3187
-
Medium
MySQL CVE-2018-3186 Vulnerability (CVE-2018-3186)
CVE-2018-3186
-
Medium
MySQL CVE-2018-3185 Vulnerability (CVE-2018-3185)
CVE-2018-3185
-
Medium
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2202)
CVE-2011-2202
CWE-264
Medium
MySQL CVE-2018-3182 Vulnerability (CVE-2018-3182)
CVE-2018-3182
-
Medium
Java Denial of Service (DoS) Vulnerability (CVE-2018-3180)
CVE-2018-3180
-
Medium
«
1
...
175
176
177
...
196
»