Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
PleskLin Other Vulnerability
PleskLin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PleskLin Permissions Privileges and Access Controls Vulnerability
PleskLin Exposure of Resource to Wrong Sphere Vulnerability
PleskWin Permissions Privileges and Access Controls Vulnerability
PleskWin Other Vulnerability
PleskWin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PleskWin Exposure of Resource to Wrong Sphere Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid NULL Pointer Dereference Vulnerability
Squid Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Squid Improper Input Validation Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Exposure of Resource to Wrong Sphere Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Out-of-bounds Write Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Out-of-bounds Write Vulnerability
Squid NULL Pointer Dereference Vulnerability
Squid Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Other Vulnerability
Squid Improper Input Validation Vulnerability
Squid Insufficient Verification of Data Authenticity Vulnerability
Squid Insufficient Verification of Data Authenticity Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability