Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Observable Discrepancy Vulnerability
Jetty Improper Resource Shutdown or Release Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Integer Overflow or Wraparound Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Tornado Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Open Resty Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Open Resty Off-by-one Error Vulnerability
Open Resty Uncontrolled Resource Consumption Vulnerability
Werkzeug WSGI Insufficient Entropy Vulnerability
Werkzeug WSGI Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability
Werkzeug WSGI Out-of-bounds Write Vulnerability
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability
Varnish Cache Reachable Assertion Vulnerability
Varnish Cache Integer Overflow or Wraparound Vulnerability
Varnish Cache Other Vulnerability
Varnish Cache Other Vulnerability
Oracle HTTP Server Out-of-bounds Read Vulnerability
Oracle HTTP Server Out-of-bounds Read Vulnerability
Oracle HTTP Server NULL Pointer Dereference Vulnerability
Oracle HTTP Server Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability