High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
OpenVPN AS Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability
OpenVPN AS Insertion of Sensitive Information into Log File Vulnerability
OpenVPN AS Other Vulnerability
OpenVPN AS Divide By Zero Vulnerability
Caddy Web Server Out-of-bounds Read Vulnerability
Caddy Web Server Uncontrolled Resource Consumption Vulnerability
Kong Server Incorrect Authorization Vulnerability
Kong Server Uncontrolled Resource Consumption Vulnerability
PleskLin Other Vulnerability
PleskLin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PleskLin Permissions Privileges and Access Controls Vulnerability
PleskLin Exposure of Resource to Wrong Sphere Vulnerability
PleskWin Permissions Privileges and Access Controls Vulnerability
PleskWin Other Vulnerability
PleskWin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PleskWin Exposure of Resource to Wrong Sphere Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid NULL Pointer Dereference Vulnerability
Squid Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Squid Improper Input Validation Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Exposure of Resource to Wrong Sphere Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Out-of-bounds Write Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Out-of-bounds Write Vulnerability
Squid NULL Pointer Dereference Vulnerability