Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
PHP Out-of-bounds Read Vulnerability
PHP Use After Free Vulnerability
PHP Out-of-bounds Write Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Use of Uninitialized Resource Vulnerability
PHP Integer Overflow or Wraparound Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Incorrect Calculation of Buffer Size Vulnerability
PHP Integer Overflow or Wraparound Vulnerability
PHP Insufficient Entropy Vulnerability
PHP Integer Overflow or Wraparound Vulnerability
PHP Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
PHP Out-of-bounds Write Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Use After Free Vulnerability
PHP Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
PHP Integer Overflow or Wraparound Vulnerability
PHP Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
PHP Incorrect Calculation of Buffer Size Vulnerability
PHP Out-of-bounds Write Vulnerability
PHP Improper Encoding or Escaping of Output Vulnerability
PHP Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
OpenSSL Use After Free Vulnerability
OpenSSL Out-of-bounds Write Vulnerability
OpenSSL Out-of-bounds Write Vulnerability
OpenSSL Integer Overflow or Wraparound Vulnerability