Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
WordPress Plugin Event Espresso Lite-Event Management and Registration System SQL Injection
WordPress Plugin Ultimate Reviews PHP Object Injection
WordPress Plugin LOGOSWARE SUITE Uploader Arbitrary File Upload
WordPress Plugin ACF:Better Search SQL Injection
WordPress Plugin RK Responsive Contact Form SQL Injection
WordPress Plugin Gallery transformation SQL Injection
WordPress Plugin Leaky Paywall PHP Object Injection
WordPress Plugin Loginizer SQL Injection
WordPress Plugin Enmask Captcha Malicious Redirects
WordPress Plugin Advanced Contact form 7 DB Arbitrary File Upload
WordPress Plugin Advanced Contact form 7 DB SQL Injection
WordPress Plugin Advanced Contact form 7 DB SQL Injection
WordPress Plugin WP Smart Security PHP Object Injection
WordPress Plugin Flickrpress PHP Object Injection
WordPress Plugin WPJobBoard SQL Injection
WordPress Plugin Booster for WooCommerce PHP Object Injection
WordPress Plugin Booster for WooCommerce Multiple Cross-Site Request Forgery Vulnerabilities
WordPress Plugin Booster for WooCommerce Multiple Vulnerabilities
WordPress Plugin Booster for WooCommerce Multiple Vulnerabilities
WordPress Plugin Booster for WooCommerce Multiple Vulnerabilities
WordPress Plugin Booster for WooCommerce Multiple Vulnerabilities
WordPress Plugin Media Library Assistant PHP Object Injection
WordPress Plugin Media Library Assistant Multiple Vulnerabilities
WordPress Plugin Media Library Assistant Multiple Vulnerabilities
WordPress Plugin Media Library Assistant Multiple Vulnerabilities
WordPress Plugin Media Library Assistant Multiple Vulnerabilities
WordPress Plugin Media Library Assistant SQL Injection
WordPress Plugin Media Library Assistant SQL Injection
WordPress Plugin WordPress Meta Data and Taxonomies Filter (MDTF) PHP Object Injection
WordPress Plugin Ads Pro-Multi-Purpose WordPress Advertising Manager Multiple Vulnerabilities