Critical Severity Vulnerabilities
Found 2731 vulnerabilities at Critical severity.
Reference
Title
Technology
Ampache Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ampache Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Rukovoditel Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Chamilo Improper Control of Generation of Code (Code Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Chamilo Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Chamilo Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Family Connections Permissions Privileges and Access Controls Vulnerability
EspoCRM Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
phpMyFAQ Improper Restriction of Excessive Authentication Attempts Vulnerability