Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Undertow Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Undertow Vulnerability
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability
Grafana Server-Side Request Forgery (SSRF) Vulnerability
Grafana Missing Authentication for Critical Function Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Incorrect Permission Assignment for Critical Resource Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Grafana Cross-Site Request Forgery (CSRF) Vulnerability
Grafana Vulnerability
Grafana URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Grafana Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Incorrect Authorization Vulnerability
Grafana Vulnerability
Grafana Insufficiently Protected Credentials Vulnerability
Grafana Improper Verification of Cryptographic Signature Vulnerability
Grafana Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Grafana Improper Input Validation Vulnerability
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Grafana Vulnerability
Grafana Vulnerability
Grafana Vulnerability
Grafana Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Grafana Vulnerability
Jetty Vulnerability
Jetty Session Fixation Vulnerability
Jetty Other Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability