Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Dolibarr Improper Control of Generation of Code (Code Injection) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Incorrect Default Permissions Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Privilege Management Vulnerability
Dolibarr Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
ClipBucket Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
ClipBucket Unrestricted Upload of File with Dangerous Type Vulnerability
ClipBucket Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
ClipBucket Unrestricted Upload of File with Dangerous Type Vulnerability
Contao Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Contao Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Contao Key Management Errors Vulnerability
Contao Weak Password Recovery Mechanism for Forgotten Password Vulnerability
Contao Deserialization of Untrusted Data Vulnerability
TYPO3 Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability
TYPO3 Deserialization of Untrusted Data Vulnerability
TYPO3 Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
TYPO3 Improper Authentication Vulnerability
TYPO3 Improper Input Validation Vulnerability
Lodash Other Vulnerability
Lodash Improper Control of Generation of Code (Code Injection) Vulnerability
axios Origin Validation Error Vulnerability
axios Unintended Proxy or Intermediary (Confused Deputy) Vulnerability
Cherokee Out-of-bounds Write Vulnerability
math.js Improper Control of Generation of Code (Code Injection) Vulnerability
WebLogic Vulnerability