Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5565 vulnerabilities at High severity.

Reference
Title
Technology
NuSOAP Improper Certificate Validation Vulnerability
Prototype Vulnerability
Prototype Vulnerability
AngularJS Improper Input Validation Vulnerability
AngularJS Inefficient Regular Expression Complexity Vulnerability
AngularJS Inefficient Regular Expression Complexity Vulnerability
Handlebars Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Handlebars Improper Control of Generation of Code (Code Injection) Vulnerability
Handlebars Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Handlebars Improper Control of Generation of Code (Code Injection) Vulnerability
Handlebars Improper Check for Unusual or Exceptional Conditions Vulnerability
Handlebars Improper Control of Generation of Code (Code Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Neutralization of Argument Delimiters in a Command (Argument Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Control of Generation of Code (Code Injection) Vulnerability
RubyGems Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
RubyGems Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
RubyGems Deserialization of Untrusted Data Vulnerability
RubyGems Improper Link Resolution Before File Access (Link Following) Vulnerability
RubyGems Origin Validation Error Vulnerability
RubyGems Improper Input Validation Vulnerability
RubyGems Improper Input Validation Vulnerability
RubyGems Improper Authentication Vulnerability
Ruby Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Ruby Improper Control of Generation of Code (Code Injection) Vulnerability
Ruby Improper Authentication Vulnerability
Ruby Vulnerability
Ruby Improper Input Validation Vulnerability