High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Grafana Vulnerability
Grafana Vulnerability
Grafana Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Grafana Vulnerability
Jetty Vulnerability
Jetty Session Fixation Vulnerability
Jetty Other Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Observable Discrepancy Vulnerability
Jetty Improper Resource Shutdown or Release Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Integer Overflow or Wraparound Vulnerability
Jetty Uncontrolled Resource Consumption Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Tornado Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Open Resty Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Open Resty Off-by-one Error Vulnerability
Open Resty Uncontrolled Resource Consumption Vulnerability
Werkzeug WSGI Insufficient Entropy Vulnerability
Werkzeug WSGI Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability
Werkzeug WSGI Out-of-bounds Write Vulnerability
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability
Varnish Cache Reachable Assertion Vulnerability
Varnish Cache Integer Overflow or Wraparound Vulnerability
Varnish Cache Other Vulnerability
Varnish Cache Other Vulnerability