Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

High Severity Vulnerabilities

Found 5580 vulnerabilities at High severity.

Reference
Title
Technology
Liferay Portal Deserialization of Untrusted Data Vulnerability
Liferay Portal Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Incorrect Authorization Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Use of Password Hash With Insufficient Computational Effort Vulnerability
Liferay Portal Improper Restriction of XML External Entity Reference Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Uncontrolled Resource Consumption Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Unchecked Input for Loop Condition Vulnerability
Liferay Portal Insertion of Sensitive Information Into Sent Data Vulnerability
Liferay Portal Incorrect Authorization Vulnerability
Liferay Portal Server-Side Request Forgery (SSRF) Vulnerability
Liferay Portal Missing Release of Memory after Effective Lifetime Vulnerability
Liferay Portal Uncontrolled Resource Consumption Vulnerability
Liferay Portal Improper Validation of Specified Quantity in Input Vulnerability
Liferay Portal Authorization Bypass Through User-Controlled Key Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Use of Insufficiently Random Values Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability