Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Liferay Portal Incorrect Authorization Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Use of Password Hash With Insufficient Computational Effort Vulnerability
Liferay Portal Improper Restriction of XML External Entity Reference Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Use of Insufficiently Random Values Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Jenkins Other Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Uncontrolled Resource Consumption Vulnerability