Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Critical Severity Vulnerabilities

Found 2862 vulnerabilities at Critical severity.

Reference
Title
Technology
Sqlite Numeric Truncation Error Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
HSQLDB Vulnerability
WordPress Ultimate Member Plugin Vulnerability
WordPress Ultimate Member Plugin Improper Privilege Management Vulnerability
Unauthorized Admin Access for Ultimate Member plugin
WordPress Ultimate Member Plugin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Other Vulnerability
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Dot CMS Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Spring Cloud Gateway Improper Neutralization of Special Elements used in an Expression Language Statement (Expression La Vulnerability
Wordpress Plugin Backup Migration Inclusion of Functionality from Untrusted Control Sphere Vulnerability
Wordpress Plugin Backup Migration Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Wordpress Plugin Backup Migration Vulnerability
MongoDb Vulnerability
MongoDb Improper Certificate Validation Vulnerability
MongoDb Use of Uninitialized Resource Vulnerability
MongoDb Improper Check for Certificate Revocation Vulnerability
GeoServer Improper Neutralization of Special Elements used in an SQL Command
GeoServer Server-Side Request Forgery
GeoServer Vulnerability
GeoServer Improper Control of Generation of Code (Code Injection) Vulnerability
GeoServer Improper Control of Generation of Code (Code Injection) Vulnerability
GeoServer Improper Restriction of XML External Entity Reference Vulnerability
WordPress Plugin 1 Flash Gallery Cross-Site Scripting and SQL Injection Vulnerabilities