Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Dot CMS Cross-Site Request Forgery (CSRF) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dot CMS Permissions Privileges and Access Controls Vulnerability
Dot CMS Other Vulnerability
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Wordpress Plugin Backup Migration Vulnerability
Wordpress Plugin Backup Migration Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Wordpress Plugin Backup Migration Files or Directories Accessible to External Parties Vulnerability
MongoDb Out-of-bounds Write Vulnerability
MongoDb Allocation of Resources Without Limits or Throttling Vulnerability
MongoDb Improper Input Validation Vulnerability
MongoDb Vulnerability
MongoDb Insufficient Session Expiration Vulnerability
MongoDb Incorrect Comparison Vulnerability
MongoDb Improper Certificate Validation Vulnerability
MongoDb Improper Authentication Vulnerability
MongoDb Out-of-bounds Read Vulnerability
MongoDb Uncontrolled Resource Consumption Vulnerability
MongoDb Vulnerability
MongoDb Uncontrolled Recursion Vulnerability