Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
GibbonEdu Deserialization of Untrusted Data Vulnerability
Question2Answer Improper Input Validation Vulnerability
YOURLS Improper Restriction of Rendered UI Layers or Frames Vulnerability
YOURLS Cross-Site Request Forgery (CSRF) Vulnerability
WeBid Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
WeBid Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
WeBid Other Vulnerability
WeBid Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
WeBid Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
WeBid Authorization Bypass Through User-Controlled Key Vulnerability
ZenCart Improper Control of Generation of Code (Code Injection) Vulnerability
ZenCart Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
ZenCart Other Vulnerability
ZenCart Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
ZenCart Inclusion of Functionality from Untrusted Control Sphere Vulnerability
Serendipity Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability
Serendipity Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability
Serendipity Server-Side Request Forgery (SSRF) Vulnerability
Serendipity Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Serendipity Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Serendipity Permissions Privileges and Access Controls Vulnerability
Serendipity Other Vulnerability
Serendipity Other Vulnerability
Serendipity Other Vulnerability
Serendipity Other Vulnerability
Serendipity Unrestricted Upload of File with Dangerous Type Vulnerability
Serendipity Unrestricted Upload of File with Dangerous Type Vulnerability