High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
LimeSurvey Unrestricted Upload of File with Dangerous Type Vulnerability
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
LimeSurvey Vulnerability
LimeSurvey Unrestricted Upload of File with Dangerous Type Vulnerability
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PrestaShop Other Vulnerability
PrestaShop Authorization Bypass Through User-Controlled Key Vulnerability
PrestaShop Improper Control of Generation of Code (Code Injection) Vulnerability
PrestaShop Vulnerability
PrestaShop Improper Restriction of Rendered UI Layers or Frames Vulnerability
PrestaShop Vulnerability
PrestaShop Improper Neutralization of Formula Elements in a CSV File Vulnerability
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability
PrestaShop Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
PrestaShop Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
PrestaShop Server-Side Request Forgery (SSRF) Vulnerability
Moodle Improper Control of Generation of Code (Code Injection) Vulnerability
Moodle Uncontrolled Resource Consumption Vulnerability
Moodle Improper Access Control Vulnerability
Moodle Improper Privilege Management Vulnerability
Moodle Vulnerability
Moodle Improper Input Validation Vulnerability
Moodle Cross-Site Request Forgery (CSRF) Vulnerability
Moodle Other Vulnerability
Moodle Improper Input Validation Vulnerability
Moodle Improper Privilege Management Vulnerability