Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
TYPO3 Improper Authentication Vulnerability
TYPO3 Other Vulnerability
TYPO3 Other Vulnerability
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
TYPO3 Uncontrolled Recursion Vulnerability
TYPO3 Unrestricted Upload of File with Dangerous Type Vulnerability
TYPO3 Files or Directories Accessible to External Parties Vulnerability
TYPO3 Cleartext Storage of Sensitive Information Vulnerability
TYPO3 Cross-Site Request Forgery (CSRF) Vulnerability
TYPO3 Insufficient Session Expiration Vulnerability
TYPO3 Allocation of Resources Without Limits or Throttling Vulnerability
TYPO3 Uncontrolled Recursion Vulnerability
TYPO3 Improper Control of Generation of Code (Code Injection) Vulnerability
TYPO3 Vulnerability
TYPO3 Cross-Site Request Forgery (CSRF) Vulnerability
TYPO3 Exposed Dangerous Method or Function Vulnerability
TYPO3 Authentication Bypass Using an Alternate Path or Channel Vulnerability
TYPO3 Unverified Ownership Vulnerability
TYPO3 Missing Authorization Vulnerability
TYPO3 Improper Control of Generation of Code (Code Injection) Vulnerability
TYPO3 Deserialization of Untrusted Data Vulnerability
TYPO3 Missing Authorization Vulnerability
Underscore.js Improper Control of Generation of Code (Code Injection) Vulnerability
Underscore.js Allocation of Resources Without Limits or Throttling Vulnerability
DataTables Prototype Pollution Vulnerability
Lodash Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Lodash Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) Vulnerability
axios Improper Input Validation Vulnerability
axios Uncontrolled Resource Consumption Vulnerability
axios Server-Side Request Forgery (SSRF) Vulnerability