Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Oracle JRE Vulnerability
Oracle JRE Vulnerability
Oracle JRE Vulnerability
Telerik Web UI Deserialization of Untrusted Data Vulnerability
Telerik Web UI Improper Input Validation Vulnerability
Telerik Web UI Inadequate Encryption Strength Vulnerability
Telerik Web UI Insufficiently Protected Credentials Vulnerability
Telerik Web UI Missing Authorization Vulnerability
Beego Framework Vulnerability
Beego Framework Vulnerability
Beego Framework Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Beego Framework Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
SugarCRM Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
SugarCRM Missing Authorization Vulnerability
SugarCRM Improper Input Validation Vulnerability
SugarCRM Improper Restriction of XML External Entity Reference Vulnerability
SugarCRM Other Vulnerability
Liferay Portal Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Liferay Portal Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Liferay Portal Deserialization of Untrusted Data Vulnerability
Liferay Portal Unrestricted Upload of File with Dangerous Type Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Missing Authorization Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Improper Authorization Vulnerability