Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Uncontrolled Resource Consumption Vulnerability
Squid Improper Certificate Validation Vulnerability
Squid Out-of-bounds Read Vulnerability
Squid Improper Certificate Validation Vulnerability
Squid Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
Squid NULL Pointer Dereference Vulnerability
Squid Incorrect Conversion between Numeric Types Vulnerability
Squid Improper Handling of Exceptional Conditions Vulnerability
Squid Out-of-bounds Read Vulnerability
Squid Reachable Assertion Vulnerability
Squid Use After Free Vulnerability
Squid Uncontrolled Recursion Vulnerability
Squid Vulnerability
Squid Other Vulnerability
Squid Uncontrolled Recursion Vulnerability
Liferay DXP Deserialization of Untrusted Data Vulnerability
Liferay DXP Insufficiently Protected Credentials Vulnerability
Liferay DXP Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Liferay DXP Improper Authentication Vulnerability