🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
WeBid Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000882)
CVE-2018-1000882
CWE-22
High
Liferay Portal Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-10795)
CVE-2018-10795
CWE-434
High
PHP Out-of-bounds Read Vulnerability (CVE-2018-10549)
CVE-2018-10549
CWE-125
High
PHP NULL Pointer Dereference Vulnerability (CVE-2018-10548)
CVE-2018-10548
CWE-476
High
PHP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-10546)
CVE-2018-10546
CWE-835
High
phpMyAdmin Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10188)
CVE-2018-10188
CWE-352
High
AjaxControlToolkit directory traversal
CVE-2015-4670
CWE-434
High
Dolibarr Missing Authorization Vulnerability (CVE-2018-10092)
CVE-2018-10092
CWE-862
High
Frontaccounting Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-1000890)
CVE-2018-1000890
CWE-138
High
WeBid Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-1000867)
CVE-2018-1000867
CWE-138
High
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000208)
CVE-2018-1000208
CWE-22
High
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000863)
CVE-2018-1000863
CWE-22
High
WordPress Improper Input Validation Vulnerability (CVE-2018-1000773)
CVE-2018-1000773
CWE-20
High
LimeSurvey Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000659)
CVE-2018-1000659
CWE-22
High
LimeSurvey Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-1000658)
CVE-2018-1000658
CWE-434
High
Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632)
CVE-2018-1000632
CWE-91
High
Artifactory Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000623)
CVE-2018-1000623
CWE-22
High
MyBB Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVE-2018-1000502)
CVE-2018-1000502
CWE-829
High
Artifactory Insufficiently Protected Credentials Vulnerability (CVE-2018-1000424)
CVE-2018-1000424
CWE-522
High
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1000410)
CVE-2018-1000410
CWE-200
High
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-16854)
CVE-2018-16854
CWE-352
High
Apache HTTP Server Session Fixation Vulnerability (CVE-2018-17199)
CVE-2018-17199
CWE-384
High
Oracle JRE CVE-2018-2825 Vulnerability (CVE-2018-2825)
CVE-2018-2825
-
High
IBM WebSEAL CVE-2018-1850 Vulnerability (CVE-2018-1850)
CVE-2018-1850
-
High
Craft CMS Missing Encryption of Sensitive Data Vulnerability (CVE-2018-20465)
CVE-2018-20465
CWE-311
High
Python Integer Overflow or Wraparound Vulnerability (CVE-2018-20406)
CVE-2018-20406
CWE-190
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2018-20346)
CVE-2018-20346
CWE-190
High
Chamilo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-20329)
CVE-2018-20329
CWE-138
High
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-20166)
CVE-2018-20166
CWE-434
High
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-20151)
CVE-2018-20151
CWE-200
High
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2025-27556)
CVE-2025-27556
CWE-770
High
IBM WebSEAL Use of Hard-coded Credentials Vulnerability (CVE-2018-1887)
CVE-2018-1887
CWE-798
High
IBM WebSEAL Inadequate Encryption Strength Vulnerability (CVE-2018-1814)
CVE-2018-1814
CWE-326
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2018-20506)
CVE-2018-20506
CWE-190
High
SharePoint Untrusted Pointer Dereference Vulnerability (CVE-2025-27747)
CVE-2025-27747
CWE-822
High
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
CVE-2018-1336
CWE-835
High
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
CVE-2018-1336
CWE-835
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2025-29087)
CVE-2025-29087
CWE-190
High
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability (CVE-2018-1333)
CVE-2018-1333
CWE-400
High
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2018-1318)
CVE-2018-1318
CWE-20
High
Seo Panel Server-Side Request Forgery (SSRF) Vulnerability (CVE-2025-29451)
CVE-2025-29451
CWE-918
High
Seo Panel Server-Side Request Forgery (SSRF) Vulnerability (CVE-2025-29452)
CVE-2025-29452
CWE-918
High
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2018-1303)
CVE-2018-1303
CWE-125
High
Sqlite Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-20505)
CVE-2018-20505
CWE-138
High
axios Server-Side Request Forgery (SSRF) Vulnerability (CVE-2025-27152)
CVE-2025-27152
CWE-918
High
MyBB Server-Side Request Forgery (SSRF) Vulnerability (CVE-2025-29457)
CVE-2025-29457
CWE-918
High
Oracle JRE CVE-2018-2637 Vulnerability (CVE-2018-2637)
CVE-2018-2637
-
High
Oracle JRE CVE-2018-2814 Vulnerability (CVE-2018-2814)
CVE-2018-2814
-
High
Oracle JRE CVE-2018-2811 Vulnerability (CVE-2018-2811)
CVE-2018-2811
-
High
Oracle JRE CVE-2018-2794 Vulnerability (CVE-2018-2794)
CVE-2018-2794
-
High
MySQL CVE-2018-2755 Vulnerability (CVE-2018-2755)
CVE-2018-2755
-
High
MySQL CVE-2018-2696 Vulnerability (CVE-2018-2696)
CVE-2018-2696
-
High
Oracle Database Server CVE-2018-2680 Vulnerability (CVE-2018-2680)
CVE-2018-2680
-
High
Oracle JRE CVE-2018-2639 Vulnerability (CVE-2018-2639)
CVE-2018-2639
-
High
Oracle JRE CVE-2018-2638 Vulnerability (CVE-2018-2638)
CVE-2018-2638
-
High
Oracle JRE CVE-2018-2633 Vulnerability (CVE-2018-2633)
CVE-2018-2633
-
High
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-20717)
CVE-2018-20717
CWE-94
High
Oracle JRE CVE-2018-2627 Vulnerability (CVE-2018-2627)
CVE-2018-2627
-
High
MySQL CVE-2018-2562 Vulnerability (CVE-2018-2562)
CVE-2018-2562
-
High
qdPM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-25208)
CVE-2018-25208
CWE-138
High
Python Out-of-bounds Write Vulnerability (CVE-2018-25032)
CVE-2018-25032
CWE-787
High
SharePoint Integer Overflow or Wraparound Vulnerability (CVE-2025-26642)
CVE-2025-26642
CWE-190
High
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2025-26699)
CVE-2025-26699
CWE-770
High
Oracle HTTP Server Improper Restriction of XML External Entity Reference Vulnerability (CVE-2018-20843)
CVE-2018-20843
CWE-611
High
Highcharts JS Incorrect Regular Expression Vulnerability (CVE-2018-20801)
CVE-2018-20801
CWE-185
High
PHP Out-of-bounds Read Vulnerability (CVE-2018-20783)
CVE-2018-20783
CWE-125
High
WebLogic Incorrect Authorization Vulnerability (CVE-2018-1258)
CVE-2018-1258
CWE-863
High
Moodle Improper Input Validation Vulnerability (CVE-2018-1137)
CVE-2018-1137
CWE-20
High
Joomla Improper Privilege Management Vulnerability (CVE-2018-17855)
CVE-2018-17855
CWE-269
High
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2018-1999043)
CVE-2018-1999043
CWE-772
High
WordPress Deserialization of Untrusted Data Vulnerability (CVE-2018-19296)
CVE-2018-19296
CWE-502
High
phpBB Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2018-19274)
CVE-2018-19274
CWE-915
High
SharePoint Improper Authorization Vulnerability (CVE-2025-29794)
CVE-2025-29794
CWE-285
High
XWikiplatform Incorrect Authorization Vulnerability (CVE-2025-29924)
CVE-2025-29924
CWE-863
High
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-19205)
CVE-2018-19205
CWE-200
High
«
1
...
27
28
29
...
196
»