High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Improper Access Control Vulnerability
PostgreSQL Improper Access Control Vulnerability
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PostgreSQL Improper Control of Dynamically-Managed Code Resources Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PostgreSQL Improper Certificate Validation Vulnerability
PostgreSQL Vulnerability
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PostgreSQL Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Vulnerability
PostgreSQL Integer Overflow or Wraparound Vulnerability
PostgreSQL Vulnerability
PostgreSQL Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability
PostgreSQL Externally Controlled Reference to a Resource in Another Sphere Vulnerability
CKEditor Other Vulnerability
jsTree Arbitrary Code Injection Vulnerability
Moment.js Uncontrolled Resource Consumption Vulnerability
Moment.js Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Moment.js Other Vulnerability
jQuery Validation Uncontrolled Resource Consumption Vulnerability
jQuery Validation Other Vulnerability
jQuery Validation Other Vulnerability
WebERP Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability