Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Moodle Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Moodle Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Moodle Missing Authorization Vulnerability
Moodle Insufficient Verification of Data Authenticity Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
Moodle Cross-Site Request Forgery (CSRF) Vulnerability
Moodle Authorization Bypass Through User-Controlled Key Vulnerability
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Moodle Files or Directories Accessible to External Parties Vulnerability
Moodle Incorrect Default Permissions Vulnerability
Moodle Authorization Bypass Through User-Controlled Key Vulnerability
Moodle Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Moodle Improper Validation of Specified Type of Input Vulnerability
Moodle Incomplete Cleanup Vulnerability
Moodle Vulnerability
Moodle Cross-Site Request Forgery (CSRF) Vulnerability
Moodle Cross-Site Request Forgery (CSRF) Vulnerability
Moodle Improper Restriction of Excessive Authentication Attempts Vulnerability
Moodle Improper Restriction of Excessive Authentication Attempts Vulnerability
Moodle Improper Neutralization of Formula Elements in a CSV File Vulnerability
Moodle Improper Handling of Insufficient Permissions or Privileges Vulnerability
Moodle Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
TCExam Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
TCExam Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
concrete5 Unrestricted Upload of File with Dangerous Type Vulnerability
concrete5 Unrestricted Upload of File with Dangerous Type Vulnerability