🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Known Vulnerabilities
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Known Vulnerabilities
This page lists
14673 vulnerabilities
in this category.
Critical: 1573
High: 3882
Medium: 8446
Low: 770
Information: 2
Vulnerability Name
CVE
CWE
Severity
MySQL CVE-2020-2660 Vulnerability (CVE-2020-2660)
CVE-2020-2660
-
Medium
Oracle JRE CVE-2020-2655 Vulnerability (CVE-2020-2655)
CVE-2020-2655
-
Medium
MySQL CVE-2020-2627 Vulnerability (CVE-2020-2627)
CVE-2020-2627
-
Medium
Oracle JRE CVE-2020-2601 Vulnerability (CVE-2020-2601)
CVE-2020-2601
-
Medium
Oracle JRE CVE-2020-2593 Vulnerability (CVE-2020-2593)
CVE-2020-2593
-
Medium
MySQL CVE-2020-2589 Vulnerability (CVE-2020-2589)
CVE-2020-2589
-
Medium
MySQL CVE-2020-2588 Vulnerability (CVE-2020-2588)
CVE-2020-2588
-
Medium
MySQL CVE-2020-2584 Vulnerability (CVE-2020-2584)
CVE-2020-2584
-
Medium
MySQL CVE-2020-2580 Vulnerability (CVE-2020-2580)
CVE-2020-2580
-
Medium
MySQL CVE-2020-2579 Vulnerability (CVE-2020-2579)
CVE-2020-2579
-
Medium
MySQL CVE-2020-2574 Vulnerability (CVE-2020-2574)
CVE-2020-2574
-
Medium
MySQL CVE-2020-2759 Vulnerability (CVE-2020-2759)
CVE-2020-2759
-
Medium
MySQL CVE-2020-2573 Vulnerability (CVE-2020-2573)
CVE-2020-2573
-
Medium
MySQL CVE-2020-2570 Vulnerability (CVE-2020-2570)
CVE-2020-2570
-
Medium
WebLogic CVE-2020-2552 Vulnerability (CVE-2020-2552)
CVE-2020-2552
-
Medium
WebLogic CVE-2020-2550 Vulnerability (CVE-2020-2550)
CVE-2020-2550
-
Medium
Plone CMS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-4571)
CVE-2008-4571
CWE-707
Medium
WebLogic CVE-2020-2548 Vulnerability (CVE-2020-2548)
CVE-2020-2548
-
Medium
WebLogic CVE-2020-2547 Vulnerability (CVE-2020-2547)
CVE-2020-2547
-
Medium
Oracle HTTP Server CVE-2020-2545 Vulnerability (CVE-2020-2545)
CVE-2020-2545
-
Medium
WebLogic CVE-2020-2544 Vulnerability (CVE-2020-2544)
CVE-2020-2544
-
Medium
Oracle HTTP Server CVE-2020-2530 Vulnerability (CVE-2020-2530)
CVE-2020-2530
-
Medium
Oracle Database Server CVE-2020-2527 Vulnerability (CVE-2020-2527)
CVE-2020-2527
-
Medium
WebLogic CVE-2020-2519 Vulnerability (CVE-2020-2519)
CVE-2020-2519
-
Medium
Oracle Database Server CVE-2020-2515 Vulnerability (CVE-2020-2515)
CVE-2020-2515
-
Medium
Oracle Database Server CVE-2020-2512 Vulnerability (CVE-2020-2512)
CVE-2020-2512
-
Medium
MySQL CVE-2020-2752 Vulnerability (CVE-2020-2752)
CVE-2020-2752
-
Medium
MySQL CVE-2020-2760 Vulnerability (CVE-2020-2760)
CVE-2020-2760
-
Medium
MySQL CVE-2020-2898 Vulnerability (CVE-2020-2898)
CVE-2020-2898
-
Medium
MySQL CVE-2020-2806 Vulnerability (CVE-2020-2806)
CVE-2020-2806
-
Medium
MySQL CVE-2020-2897 Vulnerability (CVE-2020-2897)
CVE-2020-2897
-
Medium
MySQL CVE-2020-2896 Vulnerability (CVE-2020-2896)
CVE-2020-2896
-
Medium
MySQL CVE-2020-2895 Vulnerability (CVE-2020-2895)
CVE-2020-2895
-
Medium
MySQL CVE-2020-2893 Vulnerability (CVE-2020-2893)
CVE-2020-2893
-
Medium
MySQL CVE-2020-2892 Vulnerability (CVE-2020-2892)
CVE-2020-2892
-
Medium
Lighttpd Resource Management Errors Vulnerability (CVE-2008-4298)
CVE-2008-4298
-
Medium
WebLogic CVE-2020-2869 Vulnerability (CVE-2020-2869)
CVE-2020-2869
-
Medium
MySQL CVE-2020-2853 Vulnerability (CVE-2020-2853)
CVE-2020-2853
-
Medium
Oracle JRE CVE-2020-2830 Vulnerability (CVE-2020-2830)
CVE-2020-2830
-
Medium
WebLogic CVE-2020-2829 Vulnerability (CVE-2020-2829)
CVE-2020-2829
-
Medium
phpMyAdmin Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-4326)
CVE-2008-4326
CWE-707
Medium
MySQL CVE-2020-2814 Vulnerability (CVE-2020-2814)
CVE-2020-2814
-
Medium
MySQL CVE-2020-2812 Vulnerability (CVE-2020-2812)
CVE-2020-2812
-
Medium
WebLogic CVE-2020-2811 Vulnerability (CVE-2020-2811)
CVE-2020-2811
-
Medium
MySQL CVE-2020-2804 Vulnerability (CVE-2020-2804)
CVE-2020-2804
-
Medium
MySQL CVE-2020-2761 Vulnerability (CVE-2020-2761)
CVE-2020-2761
-
Medium
MySQL CVE-2020-2770 Vulnerability (CVE-2020-2770)
CVE-2020-2770
-
Medium
MySQL CVE-2020-2762 Vulnerability (CVE-2020-2762)
CVE-2020-2762
-
Medium
MySQL CVE-2020-2763 Vulnerability (CVE-2020-2763)
CVE-2020-2763
-
Medium
MySQL CVE-2020-2765 Vulnerability (CVE-2020-2765)
CVE-2020-2765
-
Medium
WebLogic CVE-2020-2766 Vulnerability (CVE-2020-2766)
CVE-2020-2766
-
Medium
Oracle JRE CVE-2020-2767 Vulnerability (CVE-2020-2767)
CVE-2020-2767
-
Medium
MySQL CVE-2020-2768 Vulnerability (CVE-2020-2768)
CVE-2020-2768
-
Medium
MySQL CVE-2020-2774 Vulnerability (CVE-2020-2774)
CVE-2020-2774
-
Medium
MediaWiki Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-4408)
CVE-2008-4408
CWE-707
Medium
MySQL CVE-2020-2779 Vulnerability (CVE-2020-2779)
CVE-2020-2779
-
Medium
MySQL CVE-2020-2780 Vulnerability (CVE-2020-2780)
CVE-2020-2780
-
Medium
Oracle JRE CVE-2020-2781 Vulnerability (CVE-2020-2781)
CVE-2020-2781
-
Medium
MySQL CVE-2020-2790 Vulnerability (CVE-2020-2790)
CVE-2020-2790
-
Medium
Oracle JRE CVE-2020-2800 Vulnerability (CVE-2020-2800)
CVE-2020-2800
-
Medium
XOOPS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-4432)
CVE-2008-4432
CWE-707
Medium
Atlassian Jira Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-36289)
CVE-2020-36289
CWE-200
Medium
PHP Improper Input Validation Vulnerability (CVE-2008-3660)
CVE-2008-3660
CWE-20
Medium
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-4790)
CVE-2008-4790
CWE-264
Medium
MediaWiki Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-6163)
CVE-2020-6163
CWE-707
Medium
PHP Reliance on Cookies without Validation and Integrity Checking Vulnerability (CVE-2020-7070)
CVE-2020-7070
CWE-565
Medium
PHP Inadequate Encryption Strength Vulnerability (CVE-2020-7069)
CVE-2020-7069
CWE-326
Medium
PHP Other Vulnerability (CVE-2020-7066)
CVE-2020-7066
-
Medium
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3226)
CVE-2008-3226
CWE-264
Medium
PHP Out-of-bounds Read Vulnerability (CVE-2020-7064)
CVE-2020-7064
CWE-125
Medium
PHP Improper Preservation of Permissions Vulnerability (CVE-2020-7063)
CVE-2020-7063
CWE-281
Medium
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3233)
CVE-2008-3233
CWE-707
Medium
Claroline Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-3260)
CVE-2008-3260
CWE-707
Medium
WordPress Ultimate Member Plugin Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2020-6859)
CVE-2020-6859
CWE-639
Medium
Claroline Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-3261)
CVE-2008-3261
CWE-59
Medium
«
1
...
84
85
86
...
196
»