Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Chamilo Incorrect Authorization Vulnerability
Chamilo Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Chamilo Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Chamilo Improper Enforcement of Behavioral Workflow Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Deserialization of Untrusted Data Vulnerability
Chamilo Cross-Site Request Forgery (CSRF) Vulnerability
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Improper Control of Generation of Code (Code Injection) Vulnerability
Chamilo Use of Insufficiently Random Values Vulnerability
Chamilo Improper Privilege Management Vulnerability
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability
Chamilo Authorization Bypass Through User-Controlled Key Vulnerability
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability
Chamilo Authorization Bypass Through User-Controlled Key Vulnerability
Chamilo NULL Pointer Dereference Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Session Fixation Vulnerability
Chamilo Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Chamilo Improper Privilege Management Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Authorization Bypass Through User-Controlled Key Vulnerability