🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
WebLogic CVE-2020-14750 Vulnerability (CVE-2020-14750)
CVE-2020-14750
-
Critical
WebLogic CVE-2020-14687 Vulnerability (CVE-2020-14687)
CVE-2020-14687
-
Critical
WebLogic CVE-2020-14645 Vulnerability (CVE-2020-14645)
CVE-2020-14645
-
Critical
WebLogic CVE-2020-14644 Vulnerability (CVE-2020-14644)
CVE-2020-14644
-
Critical
WebLogic CVE-2020-14625 Vulnerability (CVE-2020-14625)
CVE-2020-14625
-
Critical
Atlassian Jira Deserialization of Untrusted Data Vulnerability (CVE-2020-14172)
CVE-2020-14172
CWE-502
Critical
Oracle Database Server CVE-2009-1985 Vulnerability (CVE-2009-1985)
CVE-2009-1985
-
Critical
WebLogic CVE-2020-14841 Vulnerability (CVE-2020-14841)
CVE-2020-14841
-
Critical
Oracle Database Server CVE-2009-1992 Vulnerability (CVE-2009-1992)
CVE-2009-1992
-
Critical
Drupal Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-13675)
CVE-2020-13675
CWE-434
Critical
Drupal CVE-2020-13665 Vulnerability (CVE-2020-13665)
CVE-2020-13665
-
Critical
Ruby on Rails Improper Authentication Vulnerability (CVE-2009-2422)
CVE-2009-2422
CWE-287
Critical
Roundcube Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') Vulnerability (CVE-2020-12641)
CVE-2020-12641
CWE-707
Critical
Roundcube Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2020-12640)
CVE-2020-12640
CWE-22
Critical
WebLogic CVE-2020-14825 Vulnerability (CVE-2020-14825)
CVE-2020-14825
-
Critical
WebLogic CVE-2020-14859 Vulnerability (CVE-2020-14859)
CVE-2020-14859
-
Critical
Squid Integer Overflow or Wraparound Vulnerability (CVE-2020-11945)
CVE-2020-11945
CWE-190
Critical
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-19213)
CVE-2020-19213
CWE-138
Critical
Oracle Database Server Improper Input Validation Vulnerability (CVE-2020-1953)
CVE-2020-1953
CWE-20
Critical
Apache Traffic Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-1944)
CVE-2020-1944
CWE-444
Critical
Apache Tomcat Other Vulnerability (CVE-2020-1938)
CVE-2020-1938
-
Critical
TYPO3 Improper Input Validation Vulnerability (CVE-2009-0258)
CVE-2009-0258
CWE-20
Critical
Undertow Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-1745)
CVE-2020-1745
CWE-200
Critical
SharePoint Improper Input Validation Vulnerability (CVE-2020-1025)
CVE-2020-1025
CWE-20
Critical
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-19138)
CVE-2020-19138
CWE-434
Critical
WebLogic CVE-2020-14882 Vulnerability (CVE-2020-14882)
CVE-2020-14882
-
Critical
SharePoint CVE-2020-17118 Vulnerability (CVE-2020-17118)
CVE-2020-17118
-
Critical
Oracle Database Server CVE-2009-1020 Vulnerability (CVE-2009-1020)
CVE-2009-1020
-
Critical
Python Incorrect Authorization Vulnerability (CVE-2020-15801)
CVE-2020-15801
CWE-863
Critical
Pega Infinity Improper Privilege Management Vulnerability (CVE-2020-15390)
CVE-2020-15390
CWE-269
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-15160)
CVE-2020-15160
CWE-138
Critical
Ampache Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-15153)
CVE-2020-15153
CWE-138
Critical
phpMyAdmin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2009-1151)
CVE-2009-1151
CWE-94
Critical
Apache HTTP Server Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2020-11984)
CVE-2020-11984
CWE-120
Critical
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-11820)
CVE-2020-11820
CWE-138
Critical
Magento CVE-2019-8144 Vulnerability (CVE-2019-8144)
CVE-2019-8144
-
Critical
PHP Other Vulnerability (CVE-2009-4143)
CVE-2009-4143
-
Critical
Python Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-9948)
CVE-2019-9948
CWE-22
Critical
Envoy Proxy Use of Incorrectly-Resolved Name or Reference Vulnerability (CVE-2019-9901)
CVE-2019-9901
CWE-706
Critical
Artifactory CVE-2019-9733 Vulnerability (CVE-2019-9733)
CVE-2019-9733
-
Critical
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9641)
CVE-2019-9641
CWE-119
Critical
Python CVE-2019-9636 Vulnerability (CVE-2019-9636)
CVE-2019-9636
-
Critical
Nexus Repository Manager Improper Authentication Vulnerability (CVE-2019-9629)
CVE-2019-9629
CWE-287
Critical
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9025)
CVE-2019-9025
CWE-119
Critical
TwistedHTTP Request Splitting Vulnerability (CVE-2020-10108)
CVE-2020-10108
-
Critical
PHP Out-of-bounds Read Vulnerability (CVE-2019-9023)
CVE-2019-9023
CWE-125
Critical
PHP Out-of-bounds Read Vulnerability (CVE-2019-9021)
CVE-2019-9021
CWE-125
Critical
PHP Use After Free Vulnerability (CVE-2019-9020)
CVE-2019-9020
CWE-416
Critical
Sqlite Out-of-bounds Read Vulnerability (CVE-2019-8457)
CVE-2019-8457
CWE-125
Critical
Magento XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2019-8158)
CVE-2019-8158
CWE-91
Critical
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047)
CVE-2009-5047
CWE-119
Critical
Magento Insufficient Session Expiration Vulnerability (CVE-2019-8149)
CVE-2019-8149
CWE-613
Critical
LimeSurvey Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-9960)
CVE-2019-9960
CWE-22
Critical
TwistedHTTP Request Splitting Vulnerability (CVE-2020-10109)
CVE-2020-10109
-
Critical
Rukovoditel Improper Input Validation Vulnerability (CVE-2020-11819)
CVE-2020-11819
CWE-20
Critical
Sqlite Use After Free Vulnerability (CVE-2020-11656)
CVE-2020-11656
CWE-416
Critical
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-2853)
CVE-2009-2853
CWE-264
Critical
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-11817)
CVE-2020-11817
CWE-434
Critical
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-11816)
CVE-2020-11816
CWE-138
Critical
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-11815)
CVE-2020-11815
CWE-434
Critical
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-11812)
CVE-2020-11812
CWE-138
Critical
qdPM Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-11811)
CVE-2020-11811
CWE-434
Critical
Internet Information Services Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2009-3023)
CVE-2009-3023
CWE-120
Critical
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-10243)
CVE-2020-10243
CWE-138
Critical
OpenSSL Improper Input Validation Vulnerability (CVE-2009-3245)
CVE-2009-3245
CWE-20
Critical
Drupal CVE-2009-3352 Vulnerability (CVE-2009-3352)
CVE-2009-3352
-
Critical
TYPO3 Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2020-11066)
CVE-2020-11066
CWE-915
Critical
Oracle Database Server CVE-2009-3415 Vulnerability (CVE-2009-3415)
CVE-2009-3415
-
Critical
Serendipity Remote Code Execution (CVE-2020-10964)
CVE-2020-10964
-
Critical
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-3546)
CVE-2009-3546
CWE-119
Critical
MediaWiki Improper Privilege Management Vulnerability (CVE-2020-10534)
CVE-2020-10534
CWE-269
Critical
Oracle Database Server CVE-2008-0344 Vulnerability (CVE-2008-0344)
CVE-2008-0344
-
Critical
Oracle Database Server CVE-2008-0343 Vulnerability (CVE-2008-0343)
CVE-2008-0343
-
Critical
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2019-16335)
CVE-2019-16335
CWE-502
Critical
Dolibarr Incorrect Default Permissions Vulnerability (CVE-2022-40871)
CVE-2022-40871
CWE-276
Critical
«
1
...
3
4
5
...
196
»