Critical Severity Vulnerabilities

Found 2731 vulnerabilities at Critical severity.

Reference
Title
Technology
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Input Validation Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolibarr Improper Control of Generation of Code (Code Injection) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Incorrect Default Permissions Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Privilege Management Vulnerability
Dolibarr Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolibarr Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
ClipBucket Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
ClipBucket Unrestricted Upload of File with Dangerous Type Vulnerability
ClipBucket Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Contao Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Contao Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Contao Key Management Errors Vulnerability
Contao Weak Password Recovery Mechanism for Forgotten Password Vulnerability
Contao Deserialization of Untrusted Data Vulnerability
TYPO3 Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability
TYPO3 Deserialization of Untrusted Data Vulnerability
TYPO3 Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
TYPO3 Improper Authentication Vulnerability
TYPO3 Improper Input Validation Vulnerability
Lodash Other Vulnerability
Cherokee Out-of-bounds Write Vulnerability
math.js Improper Control of Generation of Code (Code Injection) Vulnerability
WebLogic Vulnerability
WebLogic Vulnerability