Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Grafana Signature Verification Vulnerability
Grafana Externally Controlled Reference to a Resource in Another Sphere Vulnerability
Grafana Cleartext Storage of Sensitive Information Vulnerability
Grafana Missing Authentication for Critical Function Vulnerability
Grafana Authentication Bypass by Spoofing Vulnerability
Grafana Incorrect Privilege Assignment Vulnerability
Grafana Improper Control of Generation of Code (Code Injection) Vulnerability
Jetty Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Jetty Integer Overflow or Wraparound Vulnerability
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Jetty Improper Access Control Vulnerability
Open Resty Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
CrushFTP Server Deserialization of Untrusted Data Vulnerability
CrushFTP Server Improper Control of Dynamically-Managed Code Resources Vulnerability
CrushFTP Server Improper Control of Generation of Code (Code Injection) Vulnerability
CrushFTP Server Other Vulnerability
CrushFTP Server Unprotected Alternate Channel Vulnerability
CrushFTP Server Weak Password Recovery Mechanism for Forgotten Password Vulnerability
Werkzeug WSGI Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Varnish Cache Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Oracle HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Out-of-bounds Write Vulnerability
Oracle HTTP Server Integer Overflow or Wraparound Vulnerability
Oracle HTTP Server Exposure of Resource to Wrong Sphere Vulnerability
Oracle HTTP Server Improper Encoding or Escaping of Output Vulnerability