High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Handlebars Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Handlebars Improper Control of Generation of Code (Code Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Neutralization of Argument Delimiters in a Command (Argument Injection) Vulnerability
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
RubyGems Improper Control of Generation of Code (Code Injection) Vulnerability
RubyGems Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
RubyGems Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
RubyGems Deserialization of Untrusted Data Vulnerability
RubyGems Improper Link Resolution Before File Access (Link Following) Vulnerability
RubyGems Origin Validation Error Vulnerability
RubyGems Improper Input Validation Vulnerability
RubyGems Improper Input Validation Vulnerability
RubyGems Improper Authentication Vulnerability
Ruby Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Ruby Improper Control of Generation of Code (Code Injection) Vulnerability
Ruby Improper Authentication Vulnerability
Ruby Vulnerability
Ruby Improper Input Validation Vulnerability
Ruby Use of Externally-Controlled Format String Vulnerability
Ruby Uncontrolled Resource Consumption Vulnerability
Ruby Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Ruby Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Ruby Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Ruby Improper Authentication Vulnerability
Ruby Improper Input Validation Vulnerability
Ruby Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Ruby Resource Management Errors Vulnerability
Ruby Improper Input Validation Vulnerability