🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
Oracle Application Server Other Vulnerability (CVE-2005-1495)
CVE-2005-1495
-
High
WordPress Improper Authentication Vulnerability (CVE-2008-1930)
CVE-2008-1930
CWE-287
High
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-1935)
CVE-2008-1935
CWE-138
High
WordPress Other Vulnerability (CVE-2005-1687)
CVE-2005-1687
-
High
OpenSSL Cryptographic Issues Vulnerability (CVE-2000-1254)
CVE-2000-1254
-
High
Oracle Application Server Other Vulnerability (CVE-2000-1236)
CVE-2000-1236
-
High
PHP Other Vulnerability (CVE-2007-1883)
CVE-2007-1883
-
High
PHP Other Vulnerability (CVE-2007-1887)
CVE-2007-1887
-
High
Zope Web Application Server Other Vulnerability (CVE-2000-1211)
CVE-2000-1211
-
High
Oracle Application Server Other Vulnerability (CVE-2001-0419)
CVE-2001-0419
-
High
Serendipity Other Vulnerability (CVE-2005-1134)
CVE-2005-1134
-
High
PHP Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-1868)
CVE-2010-1868
CWE-94
High
Oracle Database Server Other Vulnerability (CVE-2005-1197)
CVE-2005-1197
-
High
Apache HTTP Server Other Vulnerability (CVE-2005-1344)
CVE-2005-1344
-
High
Internet Information Services Other Vulnerability (CVE-2001-0507)
CVE-2001-0507
-
High
Internet Information Services Other Vulnerability (CVE-2001-0506)
CVE-2001-0506
-
High
phpMyAdmin Other Vulnerability (CVE-2001-0478)
CVE-2001-0478
-
High
Claroline Other Vulnerability (CVE-2005-1375)
CVE-2005-1375
-
High
PHP Other Vulnerability (CVE-2007-1888)
CVE-2007-1888
-
High
PHP Other Vulnerability (CVE-2007-1890)
CVE-2007-1890
-
High
Claroline Other Vulnerability (CVE-2005-1376)
CVE-2005-1376
-
High
Claroline Other Vulnerability (CVE-2005-1377)
CVE-2005-1377
-
High
Oracle Application Server Other Vulnerability (CVE-2005-1383)
CVE-2005-1383
-
High
Microsoft SQL Server Other Vulnerability (CVE-2001-0344)
CVE-2001-0344
-
High
PostgreSQL Other Vulnerability (CVE-2005-1409)
CVE-2005-1409
-
High
PHP Other Vulnerability (CVE-2007-1889)
CVE-2007-1889
-
High
Oracle Database Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1675)
CVE-2012-1675
CWE-264
High
WordPress Other Vulnerability (CVE-2005-1810)
CVE-2005-1810
-
High
e107 Other Vulnerability (CVE-2005-2559)
CVE-2005-2559
-
High
Joomla Improper Privilege Management Vulnerability (CVE-2012-1563)
CVE-2012-1563
CWE-269
High
Mailman Other Vulnerability (CVE-2000-0861)
CVE-2000-0861
-
High
XOOPS Other Vulnerability (CVE-2005-2113)
CVE-2005-2113
-
High
PHP Numeric Errors Vulnerability (CVE-2008-2107)
CVE-2008-2107
-
High
PHP Other Vulnerability (CVE-2007-1718)
CVE-2007-1718
-
High
MediaWiki Improper Input Validation Vulnerability (CVE-2013-1816)
CVE-2013-1816
CWE-20
High
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1817)
CVE-2013-1817
CWE-200
High
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2146)
CVE-2008-2146
CWE-264
High
Python Integer Overflow or Wraparound Vulnerability (CVE-2008-2315)
CVE-2008-2315
CWE-190
High
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1598)
CVE-2012-1598
CWE-264
High
Internet Information Services Other Vulnerability (CVE-2000-0746)
CVE-2000-0746
-
High
Zope Web Application Server Other Vulnerability (CVE-2000-0725)
CVE-2000-0725
-
High
Python Numeric Errors Vulnerability (CVE-2008-2316)
CVE-2008-2316
-
High
Joomla Use of Insufficiently Random Values Vulnerability (CVE-2012-1562)
CVE-2012-1562
CWE-330
High
PleskLin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1557)
CVE-2012-1557
CWE-138
High
phpBB CVE-2010-1630 Vulnerability (CVE-2010-1630)
CVE-2010-1630
-
High
PleskWin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1557)
CVE-2012-1557
CWE-138
High
WordPress Other Vulnerability (CVE-2005-2108)
CVE-2005-2108
-
High
Internet Information Services Other Vulnerability (CVE-2000-0884)
CVE-2000-0884
-
High
Drupal Other Vulnerability (CVE-2005-1871)
CVE-2005-1871
-
High
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1635)
CVE-2013-1635
CWE-264
High
PostgreSQL Other Vulnerability (CVE-2012-1618)
CVE-2012-1618
-
High
Drupal Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2005-1921)
CVE-2005-1921
CWE-94
High
Oracle JRE CVE-2013-1563 Vulnerability (CVE-2013-1563)
CVE-2013-1563
-
High
e107 Other Vulnerability (CVE-2005-1949)
CVE-2005-1949
-
High
IBMHttpServer Other Vulnerability (CVE-2000-1168)
CVE-2000-1168
-
High
e107 Other Vulnerability (CVE-2005-1966)
CVE-2005-1966
-
High
Internet Information Services Other Vulnerability (CVE-2000-1104)
CVE-2000-1104
-
High
PHP Other Vulnerability (CVE-2007-1825)
CVE-2007-1825
-
High
Internet Information Services Other Vulnerability (CVE-2000-0886)
CVE-2000-0886
-
High
Perl Resource Management Errors Vulnerability (CVE-2013-1667)
CVE-2013-1667
-
High
PHP Address Book Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-1748)
CVE-2013-1748
CWE-138
High
Python CVE-2013-1753 Vulnerability (CVE-2013-1753)
CVE-2013-1753
-
High
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-1803)
CVE-2013-1803
CWE-138
High
MySQL Other Vulnerability (CVE-2000-0981)
CVE-2000-0981
-
High
PHP Other Vulnerability (CVE-2007-1777)
CVE-2007-1777
-
High
Internet Information Services Other Vulnerability (CVE-2000-0970)
CVE-2000-0970
-
High
Moodle Other Vulnerability (CVE-2005-3648)
CVE-2005-3648
-
High
Apache HTTP Server CVE-1999-0236 Vulnerability (CVE-1999-0236)
CVE-1999-0236
-
High
Microsoft SQL Server Other Vulnerability (CVE-2001-0542)
CVE-2001-0542
-
High
PHP Other Vulnerability (CVE-2007-1376)
CVE-2007-1376
-
High
phpMyAdmin Improper Input Validation Vulnerability (CVE-2008-4096)
CVE-2008-4096
CWE-20
High
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-3697)
CVE-2009-3697
CWE-138
High
Joomla Numeric Errors Vulnerability (CVE-2008-4102)
CVE-2008-4102
-
High
Joomla Improper Input Validation Vulnerability (CVE-2008-4105)
CVE-2008-4105
CWE-20
High
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2011-2930)
CVE-2011-2930
CWE-138
High
«
1
...
60
61
62
...
196
»