Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Other Vulnerability
Sqlite Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
Sqlite Other Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Sqlite Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Sqlite Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
Sqlite Improper Clearing of Heap Memory Before Release (Heap Inspection) Vulnerability
WordPress JupiterX Core Plugin 3.3.8 Remote Code Execution
WordPress Plugin Login with Phone Number Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Ultimate Member Plugin Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
WordPress Ultimate Member Plugin Other Vulnerability
WordPress Ultimate Member Plugin Other Vulnerability
WordPress Ultimate Member Plugin Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Ultimate Member Plugin Weak Password Recovery Mechanism for Forgotten Password Vulnerability
WordPress Ultimate Member Plugin Improper Privilege Management Vulnerability
WordPress Ultimate Member Plugin Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Ultimate Member Plugin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability
Dot CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability