Critical Severity Vulnerabilities

Found 2731 vulnerabilities at Critical severity.

Reference
Title
Technology
Jenkins Other Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Apache Traffic Server Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Apache Traffic Server Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Apache Traffic Server Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Apache Traffic Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Apache Traffic Server Improper Access Control Vulnerability
Apache Traffic Server Vulnerability
Apache Traffic Server Vulnerability
Apache Traffic Server Vulnerability
Apache Traffic Server Out-of-bounds Write Vulnerability
Apache Traffic Server Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
Apache Traffic Server Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Undertow Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Undertow Insertion of Sensitive Information into Log File Vulnerability
Undertow Insertion of Sensitive Information into Log File Vulnerability
Undertow Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Signature Verification Vulnerability
Grafana Externally Controlled Reference to a Resource in Another Sphere Vulnerability
Grafana Cleartext Storage of Sensitive Information Vulnerability
Grafana Missing Authentication for Critical Function Vulnerability
Grafana Authentication Bypass by Spoofing Vulnerability
Jetty Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Jetty Integer Overflow or Wraparound Vulnerability
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability