High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Liferay Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Liferay Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Liferay Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Liferay Portal Deserialization of Untrusted Data Vulnerability
Liferay Portal Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Incorrect Authorization Vulnerability
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability
Liferay Portal Use of Password Hash With Insufficient Computational Effort Vulnerability
Liferay Portal Improper Restriction of XML External Entity Reference Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Use of Insufficiently Random Values Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Insufficient Session Expiration Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Authentication Vulnerability