High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Squid Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Squid Other Vulnerability
Squid Improper Input Validation Vulnerability
Squid Insufficient Verification of Data Authenticity Vulnerability
Squid Insufficient Verification of Data Authenticity Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Input Validation Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Squid Uncontrolled Resource Consumption Vulnerability
Squid Improper Certificate Validation Vulnerability
Squid Out-of-bounds Read Vulnerability
Squid Improper Certificate Validation Vulnerability
Squid Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
Squid NULL Pointer Dereference Vulnerability
Squid Incorrect Conversion between Numeric Types Vulnerability
Squid Improper Handling of Exceptional Conditions Vulnerability
Squid Out-of-bounds Read Vulnerability
Squid Reachable Assertion Vulnerability
Squid Use After Free Vulnerability