Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Atlassian Confluence Uncontrolled Search Path Element Vulnerability
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Incorrect Behavior Order: Validate Before Canonicalize Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Confluence Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Confluence Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Confluence Asymmetric Resource Consumption (Amplification) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Jira Vulnerability
Atlassian Jira Insufficient Session Expiration Vulnerability
Atlassian Jira Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Vulnerability
Atlassian Jira Vulnerability
Atlassian Jira Uncontrolled Search Path Element Vulnerability