Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
WordPress Ultimate Member Plugin Improper Privilege Management Vulnerability
WordPress Ultimate Member Plugin Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Ultimate Member Plugin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability
Dot CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Dot CMS Cross-Site Request Forgery (CSRF) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Permissions Privileges and Access Controls Vulnerability
Dot CMS Other Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Wordpress Plugin Backup Migration Vulnerability
Wordpress Plugin Backup Migration Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Wordpress Plugin Backup Migration Files or Directories Accessible to External Parties Vulnerability
MongoDb Out-of-bounds Write Vulnerability
MongoDb Allocation of Resources Without Limits or Throttling Vulnerability
MongoDb Improper Input Validation Vulnerability
MongoDb Vulnerability
MongoDb Insufficient Session Expiration Vulnerability
MongoDb Incorrect Comparison Vulnerability