Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5565 vulnerabilities at High severity.

Reference
Title
Technology
Apache Tomcat Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Apache Tomcat Vulnerability
Apache Tomcat Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Apache Tomcat Incomplete Cleanup Vulnerability
Apache Tomcat Uncontrolled Resource Consumption Vulnerability
Apache Tomcat Integer Overflow or Wraparound Vulnerability
Apache Tomcat Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Apache Tomcat Authentication Bypass Using an Alternate Path or Channel Vulnerability
Apache Tomcat Untrusted Search Path Vulnerability
Apache Tomcat Improper Resource Shutdown or Release Vulnerability
Apache Tomcat Allocation of Resources Without Limits or Throttling Vulnerability
Apache Tomcat Improper Handling of Case Sensitivity Vulnerability
Apache Tomcat Uncontrolled Resource Consumption Vulnerability
Apache Tomcat Vulnerability
Apache Tomcat Relative Path Traversal Vulnerability
Apache Tomcat Vulnerability
Apache Tomcat Insertion of Sensitive Information into Log File Vulnerability
Apache Tomcat Missing Encryption of Sensitive Data Vulnerability
Apache Tomcat Improper Encoding or Escaping of Output Vulnerability
Apache Tomcat Generation of Error Message Containing Sensitive Information Vulnerability
Apache Tomcat Use of a Broken or Risky Cryptographic Algorithm Vulnerability
Apache Tomcat Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability
Oracle Database Server Vulnerability