CVSS v3: 9.0 - 10.0

Critical-Risk Profile Scanner

Maximum severity vulnerability scanning for WordPress, Drupal, and generic web applications. Detect critical CVEs with CVSS scores between 9.0 and 10.0.

Critical Severity Warning

This profile scans for the most severe vulnerabilities that require immediate attention. These vulnerabilities can lead to complete system compromise, data breaches, and unauthorized access.

Profile Overview

What is Critical-Risk Profile?

The Critical-Risk Profile focuses on vulnerabilities with a CVSS v3 severity score between 9.0 and 10.0. These are the most severe security flaws that can result in complete system compromise. This profile supports CVE-based vulnerability checking for WordPress, Drupal, and generic web applications.

Supported Platforms

WordPress: Critical vulnerabilities in WordPress core, plugins, and themes that allow remote code execution, privilege escalation, or complete site takeover.

Drupal: Critical Drupal core and module vulnerabilities including SQL injection, remote code execution, and authentication bypass.

Generic/Others: Platform-independent critical vulnerabilities affecting various web applications and frameworks.

Usage

Run the Critical-Risk Profile scan with the following command:

waymap --target https://example.com --profile critical-risk

CVE Coverage

CRITICAL

WordPress CVEs

Comprehensive database of critical WordPress vulnerabilities including zero-day exploits, remote code execution, and authentication bypass vulnerabilities.

CRITICAL

Drupal CVEs

Critical Drupal vulnerabilities covering Drupalgeddon and other severe security flaws that allow complete site compromise.

CRITICAL

Generic CVEs

Platform-independent critical vulnerabilities including CVE-2023-24774 and CVE-2023-24775 affecting various web applications.

CVSS 9.0-10.0

CVE Database

Continuously updated database with hundreds of critical CVEs. Regular updates ensure coverage of the latest zero-day and critical vulnerabilities.

Immediate Action Required

If critical vulnerabilities are detected, immediate remediation is required. These vulnerabilities are actively exploited in the wild and can lead to severe security breaches.

View Complete CVE List Back to Home