High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Ruby on Rails Allocation of Resources Without Limits or Throttling Vulnerability
Ruby on Rails Vulnerability
Ruby on Rails Deserialization of Untrusted Data Vulnerability
Ruby on Rails Improper Access Control Vulnerability
Ruby on Rails Uncontrolled Resource Consumption Vulnerability
Ruby on Rails Resource Management Errors Vulnerability
Ruby on Rails Permissions Privileges and Access Controls Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Other Vulnerability
Ruby on Rails Improper Input Validation Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Permissions Privileges and Access Controls Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Ruby on Rails Improper Control of Generation of Code (Code Injection) Vulnerability
Ruby on Rails Vulnerability
Ruby on Rails Other Vulnerability
Ruby on Rails Vulnerability
Ruby on Rails Generation of Error Message Containing Sensitive Information Vulnerability
Ruby on Rails Inefficient Regular Expression Complexity Vulnerability
Ruby on Rails Inefficient Regular Expression Complexity Vulnerability
Ruby on Rails Inefficient Regular Expression Complexity Vulnerability
Django Incorrect Default Permissions Vulnerability
Django Incorrect Default Permissions Vulnerability
Django Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Django Uncontrolled Recursion Vulnerability
Django Uncontrolled Resource Consumption Vulnerability