Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
Jboss EAP Improper Initialization Vulnerability
Jboss EAP Uncontrolled Resource Consumption Vulnerability
Jboss EAP Vulnerability
Jboss EAP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jboss EAP Deserialization of Untrusted Data Vulnerability
Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability
Jboss EAP Uncontrolled Resource Consumption Vulnerability
Craft CMS Missing Encryption of Sensitive Data Vulnerability
Craft CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Craft CMS Improper Neutralization of Formula Elements in a CSV File Vulnerability
Craft CMS Weak Password Recovery Mechanism for Forgotten Password Vulnerability
Craft CMS Missing Encryption of Sensitive Data Vulnerability
Craft CMS Improper Control of Generation of Code (Code Injection) Vulnerability
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Craft CMS Improper Control of Generation of Code (Code Injection) Vulnerability
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Craft CMS Vulnerability
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Craft CMS Improper Authentication Vulnerability
Craft CMS Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Craft CMS Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Craft CMS Improper Control of Generation of Code (Code Injection) Vulnerability
Artifactory Improper Input Validation Vulnerability
Artifactory Vulnerability
Artifactory Insufficiently Protected Credentials Vulnerability
Artifactory Cross-Site Request Forgery (CSRF) Vulnerability
Artifactory Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability