Looking for the vulnerability index of Invicti's legacy products?

Critical Severity Vulnerabilities

Found 2727 vulnerabilities at Critical severity.

Reference
Title
Technology
WordPress Plugin IWantOneButton updateAJAX.php SQL Injection
WordPress Plugin Relevanssi-A Better Search SQL Injection
WordPress Plugin Relevanssi-A Better Search SQL Injection
WordPress Plugin GigPress Multiple SQL Injection Vulnerabilities
WordPress Plugin GigPress Multiple Vulnerabilities
WordPress Plugin Zotpress zotpress.rss.php SQL Injection
WordPress Plugin Z-Vote zvote Parameter SQL Injection
WordPress Plugin cdnvote cdnvote-post.php Multiple SQL Injection Vulnerabilities
WordPress Plugin Comment Rating id Parameter SQL Injection
WordPress Plugin GD Star Rating votes Parameter SQL Injection
WordPress Plugin GD Star Rating de Parameter SQL Injection
WordPress Plugin GD Star Rating Multiple Vulnerabilities
WordPress Plugin GD Star Rating Multiple Vulnerabilities
WordPress Plugin WP Forum Server Multiple SQL Injection
WordPress Plugin WP Forum Server edit_post_id Parameter SQL Injection
WordPress Plugin WP Forum Server Cross-Site Scripting and SQL Injection Vulnerabilities
WordPress Plugin WP Forum Server Cross-Site Scripting and SQL Injection Vulnerabilities
WordPress Plugin WP Forum Server Cross-Site Scripting and SQL Injection Vulnerabilities
WordPress Plugin WP-Forum Multiple SQL Injection Vulnerabilities
WordPress Plugin WP Forum Multiple Security Vulnerbilities
WordPress Plugin WP-Forum Multiple SQL Injection Vulnerabilities
WordPress Plugin WP-Forum forum_feed.php SQL Injection
WordPress Plugin WP-Forum SQL Injection
WordPress Plugin WP-Forum sendmail.php SQL Injection
WordPress Plugin WP-Forum SQL Injection
WordPress Plugin Enable Media Replace SQL Injection and Arbitrary File Upload Vulnerabilities
WordPress Plugin Recip.ly uploadImage.php Arbitrary File Upload
WordPress Plugin oQey Gallery gal_id Parameter SQL Injection
WordPress Plugin Uploader uploadify.php Arbitrary File Upload
WordPress Plugin Uploader Cross-Site Scripting and Arbitrary File Upload Vulnerabilities