High Severity Vulnerabilities
Found 5145 vulnerabilities at High severity.
Reference
Title
Technology
Underscore.js Improper Control of Generation of Code (Code Injection) Vulnerability
Lodash Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Lodash Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) Vulnerability
JBoss Application Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
JBoss Application Server Improper Privilege Management Vulnerability
Hiawatha Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Cherokee Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Cherokee Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
math.js Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability