🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
Moodle 7PK - Security Features Vulnerability (CVE-2015-5267)
CVE-2015-5267
-
High
osTicket Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2026-22200)
CVE-2026-22200
CWE-138
High
Django Resource Management Errors Vulnerability (CVE-2015-5145)
CVE-2015-5145
-
High
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2026-22666)
CVE-2026-22666
CWE-94
High
Django Resource Management Errors Vulnerability (CVE-2015-5143)
CVE-2015-5143
-
High
Skipper Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2026-23742)
CVE-2026-23742
CWE-94
High
Oracle Database Server CVE-2015-4873 Vulnerability (CVE-2015-4873)
CVE-2015-4873
-
High
React Uncontrolled Resource Consumption Vulnerability (CVE-2026-23864)
CVE-2026-23864
CWE-400
High
PHP Data Processing Errors Vulnerability (CVE-2015-4026)
CVE-2015-4026
-
High
PHP Numeric Errors Vulnerability (CVE-2015-4022)
CVE-2015-4022
-
High
SharePoint Deserialization of Untrusted Data Vulnerability (CVE-2026-21511)
CVE-2026-21511
CWE-502
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
CVE-2015-2080
CWE-200
High
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2026-27099)
CVE-2026-27099
CWE-707
High
MyBB CVE-2015-2352 Vulnerability (CVE-2015-2352)
CVE-2015-2352
-
High
PHP Numeric Errors Vulnerability (CVE-2015-2331)
CVE-2015-2331
-
High
PHP Out-of-bounds Read Vulnerability (CVE-2015-2325)
CVE-2015-2325
CWE-125
High
PHP Other Vulnerability (CVE-2015-2301)
CVE-2015-2301
-
High
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-2213)
CVE-2015-2213
CWE-138
High
Roundcube Multiple Buffer Overflow Vulnerabilities (CVE-2015-2181)
CVE-2015-2181
-
High
Play Framework Improper Input Validation Vulnerability (CVE-2015-2156)
CVE-2015-2156
CWE-20
High
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814)
CVE-2015-1814
CWE-264
High
Envoy Proxy Use After Free Vulnerability (CVE-2026-26330)
CVE-2026-26330
CWE-416
High
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-1789)
CVE-2015-1789
CWE-119
High
ATutor Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-1583)
CVE-2015-1583
CWE-352
High
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-1441)
CVE-2015-1441
CWE-138
High
PHP Use After Free Vulnerability (CVE-2015-1351)
CVE-2015-1351
CWE-416
High
markdown-it Inefficient Regular Expression Complexity Vulnerability (CVE-2015-10005)
CVE-2015-10005
CWE-1333
High
MySQL CVE-2015-0411 Vulnerability (CVE-2015-0411)
CVE-2015-0411
-
High
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-0292)
CVE-2015-0292
CWE-119
High
PHP Other Vulnerability (CVE-2015-0273)
CVE-2015-0273
-
High
Collabtive Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2015-0258)
CVE-2015-0258
CWE-434
High
Mailman Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-2775)
CVE-2015-2775
CWE-22
High
PHP Other Vulnerability (CVE-2015-2787)
CVE-2015-2787
-
High
SharePoint Deserialization of Untrusted Data Vulnerability (CVE-2026-26114)
CVE-2026-26114
CWE-502
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-3329)
CVE-2015-3329
CWE-119
High
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3881)
CVE-2015-3881
-
High
Sqlite Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-3717)
CVE-2015-3717
CWE-120
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
CVE-2015-3416
CWE-190
High
Sqlite Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
PHP Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
CVE-2015-3415
CWE-404
High
PHP Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
CVE-2015-3414
CWE-908
High
Sqlite Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
CVE-2015-3414
CWE-908
High
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-3307)
CVE-2015-3307
CWE-119
High
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2936)
CVE-2015-2936
-
High
Moodle Other Vulnerability (CVE-2015-3272)
CVE-2015-3272
-
High
Envoy Proxy Incorrect Authorization Vulnerability (CVE-2026-26308)
CVE-2026-26308
CWE-863
High
Lighttpd Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2015-3200)
CVE-2015-3200
CWE-138
High
OpenSSL Other Vulnerability (CVE-2015-3194)
CVE-2015-3194
-
High
OpenSSL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-3193)
CVE-2015-3193
CWE-200
High
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-3167)
CVE-2015-3167
CWE-200
High
Envoy Proxy CVE-2026-26310 Vulnerability (CVE-2026-26310)
CVE-2026-26310
-
High
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2942)
CVE-2015-2942
-
High
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2937)
CVE-2015-2937
-
High
Joomla Improper Access Control Vulnerability (CVE-2026-21629)
CVE-2026-21629
CWE-284
High
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5383)
CVE-2015-5383
CWE-200
High
PostgreSQL Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-0243)
CVE-2015-0243
CWE-120
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8562)
CVE-2015-8562
CWE-20
High
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8625)
CVE-2015-8625
CWE-200
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8624)
CVE-2015-8624
CWE-352
High
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8623)
CVE-2015-8623
CWE-352
High
Craft CMS Improper Neutralization of Special Elements Used in a Template Engine Vulnerability (CVE-2025-68454)
CVE-2025-68454
CWE-138
High
PHP Other Vulnerability (CVE-2015-8616)
CVE-2015-8616
-
High
Craft CMS Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2025-68455)
CVE-2025-68455
CWE-470
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8565)
CVE-2015-8565
CWE-20
High
Joomla Improper Input Validation Vulnerability (CVE-2015-8564)
CVE-2015-8564
CWE-20
High
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8393)
CVE-2015-8393
CWE-200
High
Moodle Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2025-67851)
CVE-2025-67851
CWE-1236
High
Roundcube Improper Encoding or Escaping of Output Vulnerability (CVE-2025-68460)
CVE-2025-68460
CWE-116
High
phpMyFAQ Exposure of Sensitive Information Through Data Queries Vulnerability (CVE-2025-69200)
CVE-2025-69200
CWE-202
High
OpenSSL Out-of-bounds Write Vulnerability (CVE-2025-69419)
CVE-2025-69419
CWE-787
High
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-8387)
CVE-2015-8387
CWE-190
High
OpenSSL Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2025-69420)
CVE-2025-69420
CWE-754
High
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2025-69421)
CVE-2025-69421
CWE-476
High
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8379)
CVE-2015-8379
CWE-352
High
«
1
...
29
30
31
...
196
»