Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Oracle Application Server Other Vulnerability
Oracle Application Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Oracle Application Server Vulnerability
Oracle Application Server Incorrect Calculation of Buffer Size Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Server-Side Request Forgery (SSRF) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Unauthenticated Remote Code Execution Vulnerability
Atlassian Confluence Incorrect Behavior Order: Validate Before Canonicalize Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Incorrect Authorization Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Jira Deserialization of Untrusted Data Vulnerability
Atlassian Jira Vulnerability
Atlassian Jira Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Deserialization of Untrusted Data Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Sqlite Improper Check for Unusual or Exceptional Conditions Vulnerability
Sqlite Incorrect Conversion between Numeric Types Vulnerability
Sqlite Use After Free Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Vulnerability
Sqlite Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Sqlite Vulnerability
Sqlite Other Vulnerability
Sqlite Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability