Looking for the vulnerability index of Invicti's legacy products?

High Severity Vulnerabilities

Found 5116 vulnerabilities at High severity.

Reference
Title
Technology
Envoy Proxy Always-Incorrect Control Flow Implementation Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Reachable Assertion Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Improper Handling of Highly Compressed Data (Data Amplification) Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Incomplete Cleanup Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Improper Handling of Exceptional Conditions Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Integer Underflow (Wrap or Wraparound) Vulnerability
Envoy Proxy Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Envoy Proxy Other Vulnerability
Envoy Proxy Uncontrolled Resource Consumption Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Vulnerability
Twisted Web HTTP Server Improper Certificate Validation Vulnerability
Twisted Web HTTP Server Improper Certificate Validation Vulnerability
Twisted Web HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Twisted Web HTTP Server Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
Twisted Web HTTP Server Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Next.js Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability