Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Oracle Application Server Permissions Privileges and Access Controls Vulnerability
Oracle Application Server Other Vulnerability
Oracle Application Server Other Vulnerability
Oracle Application Server Other Vulnerability
Oracle Application Server Other Vulnerability
Oracle Application Server Other Vulnerability
Oracle Application Server Vulnerability
Atlassian Confluence Uncontrolled Search Path Element Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Confluence Uncontrolled Search Path Element Vulnerability
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Incorrect Behavior Order: Validate Before Canonicalize Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Confluence Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability