Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Django Improper Input Validation Vulnerability
Django Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Django Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Django Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Django Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Django Missing Authorization Vulnerability
Opencart Improper Restriction of XML External Entity Reference Vulnerability
Opencart Improper Restriction of Excessive Authentication Attempts Vulnerability
Lighttpd Integer Overflow or Wraparound Vulnerability
Lighttpd Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Lighttpd Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PostgreSQL Incorrect Permission Assignment for Critical Resource Vulnerability
PostgreSQL Improper Authentication Vulnerability
PostgreSQL Permissions Privileges and Access Controls Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PostgreSQL Improper Input Validation Vulnerability
PostgreSQL Permissions Privileges and Access Controls Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
CKEditor Unrestricted Upload of File with Dangerous Type Vulnerability
React Deserialization of Untrusted Data Vulnerability
WebERP Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
WebERP Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Frontaccounting Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Frontaccounting Improper Control of Generation of Code (Code Injection) Vulnerability