Critical Severity Vulnerabilities

Found 2731 vulnerabilities at Critical severity.

Reference
Title
Technology
Atlassian Confluence Server-Side Request Forgery (SSRF) Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Unauthenticated Remote Code Execution Vulnerability
Atlassian Confluence Incorrect Behavior Order: Validate Before Canonicalize Vulnerability
Atlassian Confluence Vulnerability
Atlassian Confluence Incorrect Authorization Vulnerability
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Atlassian Jira Deserialization of Untrusted Data Vulnerability
Atlassian Jira Vulnerability
Atlassian Jira Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Deserialization of Untrusted Data Vulnerability
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Sqlite Improper Check for Unusual or Exceptional Conditions Vulnerability
Sqlite Incorrect Conversion between Numeric Types Vulnerability
Sqlite Use After Free Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Out-of-bounds Read Vulnerability
Sqlite Vulnerability
Sqlite Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Sqlite Vulnerability
Sqlite Other Vulnerability
Sqlite Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
HSQLDB Vulnerability
WordPress Ultimate Member Plugin Vulnerability
WordPress Ultimate Member Plugin Improper Privilege Management Vulnerability
Unauthorized Admin Access for Ultimate Member plugin
WordPress Ultimate Member Plugin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability