🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
Oracle JRE CVE-2014-0448 Vulnerability (CVE-2014-0448)
CVE-2014-0448
-
High
Squid Use After Free Vulnerability (CVE-2026-33526)
CVE-2026-33526
CWE-416
High
Oracle JRE CVE-2014-0458 Vulnerability (CVE-2014-0458)
CVE-2014-0458
-
High
Chamilo Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2026-33702)
CVE-2026-33702
CWE-639
High
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2026-33704)
CVE-2026-33704
CWE-434
High
Chamilo Improper Privilege Management Vulnerability (CVE-2026-33706)
CVE-2026-33706
CWE-269
High
Oracle JRE CVE-2014-0454 Vulnerability (CVE-2014-0454)
CVE-2014-0454
-
High
Oracle JRE CVE-2014-0452 Vulnerability (CVE-2014-0452)
CVE-2014-0452
-
High
Oracle JRE CVE-2014-0451 Vulnerability (CVE-2014-0451)
CVE-2014-0451
-
High
Oracle JRE CVE-2014-0446 Vulnerability (CVE-2014-0446)
CVE-2014-0446
-
High
Drupal CVE-2014-1475 Vulnerability (CVE-2014-1475)
CVE-2014-1475
-
High
Chamilo Use of Insufficiently Random Values Vulnerability (CVE-2026-33710)
CVE-2026-33710
CWE-330
High
Handlebars Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2026-33938)
CVE-2026-33938
CWE-94
High
PHP Other Vulnerability (CVE-2014-0236)
CVE-2014-0236
-
High
Apache Tomcat Resource Management Errors Vulnerability (CVE-2014-0230)
CVE-2014-0230
-
High
Python Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
CVE-2014-0224
CWE-326
High
Jboss EAP Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
CVE-2014-0224
CWE-326
High
Handlebars Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2026-33939)
CVE-2026-33939
CWE-754
High
OpenSSL Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
CVE-2014-0224
CWE-326
High
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0185)
CVE-2014-0185
CWE-264
High
FluxBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-10029)
CVE-2014-10029
CWE-138
High
Dotclear Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-1613)
CVE-2014-1613
CWE-94
High
Nginx Out-of-bounds Write Vulnerability (CVE-2014-0133)
CVE-2014-0133
CWE-787
High
Squid Improper Resource Locking Vulnerability (CVE-2026-32748)
CVE-2026-32748
CWE-413
High
ownCloud Other Vulnerability (CVE-2014-2056)
CVE-2014-2056
-
High
ownCloud Other Vulnerability (CVE-2014-2055)
CVE-2014-2055
-
High
ownCloud Other Vulnerability (CVE-2014-2054)
CVE-2014-2054
-
High
ownCloud Other Vulnerability (CVE-2014-2053)
CVE-2014-2053
-
High
Craft CMS Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2026-32264)
CVE-2026-32264
CWE-470
High
ownCloud Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-2051)
CVE-2014-2051
CWE-94
High
ownCloud Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-2044)
CVE-2014-2044
CWE-94
High
Python Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-1912)
CVE-2014-1912
CWE-119
High
Chamilo Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2026-32892)
CVE-2026-32892
CWE-138
High
SharePoint Out-of-bounds Write Vulnerability (CVE-2014-1761)
CVE-2014-1761
CWE-787
High
Chamilo NULL Pointer Dereference Vulnerability (CVE-2026-32894)
CVE-2026-32894
CWE-476
High
Chamilo Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2026-32930)
CVE-2026-32930
CWE-639
High
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2026-32931)
CVE-2026-32931
CWE-434
High
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2026-33001)
CVE-2026-33001
CWE-59
High
Jenkins Reliance on Reverse DNS Resolution for a Security-Critical Action Vulnerability (CVE-2026-33002)
CVE-2026-33002
CWE-350
High
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2026-33034)
CVE-2026-33034
CWE-770
High
Craft CMS Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2026-33157)
CVE-2026-33157
CWE-470
High
Ruby on Rails Memory Allocation with Excessive Size Value Vulnerability (CVE-2026-33174)
CVE-2026-33174
CWE-789
High
Ruby on Rails Uncontrolled Resource Consumption Vulnerability (CVE-2026-33176)
CVE-2026-33176
CWE-400
High
OpenSSL Out-of-bounds Read Vulnerability (CVE-2014-0160)
CVE-2014-0160
CWE-125
High
Nginx Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-0088)
CVE-2014-0088
CWE-119
High
Telerik Web UI Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2014-2217)
CVE-2014-2217
CWE-22
High
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-5674)
CVE-2013-5674
CWE-94
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2026-3260)
CVE-2026-3260
CWE-770
High
Django Authentication Bypass by Spoofing Vulnerability (CVE-2026-3902)
CVE-2026-3902
CWE-290
High
XWikiplatform Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2026-40104)
CVE-2026-40104
CWE-770
High
Oracle JRE CVE-2013-5802 Vulnerability (CVE-2013-5802)
CVE-2013-5802
-
High
Chamilo Improper Privilege Management Vulnerability (CVE-2026-40291)
CVE-2026-40291
CWE-269
High
MongoDb Use After Free Vulnerability (CVE-2026-4148)
CVE-2026-4148
CWE-416
High
MongoDb Double Free Vulnerability (CVE-2026-4358)
CVE-2026-4358
CWE-415
High
Oracle JRE CVE-2013-5775 Vulnerability (CVE-2013-5775)
CVE-2013-5775
-
High
PleskLin Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4878)
CVE-2013-4878
CWE-264
High
Jboss EAP Incorrect Authorization Vulnerability (CVE-2026-3009)
CVE-2026-3009
CWE-863
High
PleskWin Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4878)
CVE-2013-4878
CWE-264
High
MediaWiki Session Fixation Vulnerability (CVE-2013-4572)
CVE-2013-4572
CWE-384
High
MediaWiki Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-4571)
CVE-2013-4571
CWE-119
High
Lighttpd Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4559)
CVE-2013-4559
CWE-264
High
Nginx Improper Encoding or Escaping of Output Vulnerability (CVE-2013-4547)
CVE-2013-4547
CWE-116
High
Lighttpd Inadequate Encryption Strength Vulnerability (CVE-2013-4508)
CVE-2013-4508
CWE-326
High
WordPress Improper Input Validation Vulnerability (CVE-2013-4339)
CVE-2013-4339
CWE-20
High
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-4338)
CVE-2013-4338
CWE-94
High
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-4313)
CVE-2013-4313
CWE-138
High
Jboss EAP Incorrect Privilege Assignment Vulnerability (CVE-2026-3121)
CVE-2026-3121
CWE-266
High
Serendipity Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') Vulnerability (CVE-2026-39971)
CVE-2026-39971
CWE-707
High
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0050)
CVE-2014-0050
CWE-264
High
Roundcube Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-6172)
CVE-2013-6172
CWE-138
High
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-0001)
CVE-2014-0001
CWE-119
High
Perl Numeric Errors Vulnerability (CVE-2013-7422)
CVE-2013-7422
-
High
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-7375)
CVE-2013-7375
CWE-138
High
Python Improper Input Validation Vulnerability (CVE-2013-7338)
CVE-2013-7338
CWE-20
High
ReviveAdserver Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-7149)
CVE-2013-7149
CWE-138
High
«
1
...
31
32
33
...
196
»